And it begins.
Judge Deborah Katz, a former scientist, is presiding over the case of who holds the key intellectual property rights for CRISPR.
1st; we all know in 30 years anything can change, wars can be fought & lost, natural disasters can occur, etc. However, posting for everyone’s amusement. 30 years ago which would be 1986; no one thought USSR would be broken up, 9/11 would happen creating the US Homeland Security, Lybia & Eygpt would overthrow their own leaders, that US Space missions would be outside the US Government, hacking at the levels we have today creating the CISO roles, of VR technology would exist, DNA and CRISPR would be discovered, etc.
So, who really knows what jobs will be fully automated v. not in 30 years or even created as a result of Quantum technology (Computing, Networking, Q-Dots for numerous thing that are not only technology, etc.). Just a fun article to share with everyone.
CSIRO says the Australian workplace of the future will be increasingly digitally-focused and automated, with titles such as online chaperone.
80 million cyber attacks per year — 400 every minute — but as many as 70 percent of them go undetected. And, these numbers are anticipated to go drastically higher now “Ransomware” is paying off for hackers.
Using the internet is a risk most businesses and individuals take for granted. But as more data is stored online, the world is becoming ever more vulnerable, the head of global internet security firm Symantec, Michael Brown, says.
“While Nations gathered in Paris to negotiate an international agreement to limit greenhouse-gas emissions, Nature published a special issue “Paris Climate Talk” to cover the run-up to COP21. For this issue, Nature asked Adam Rome, environmental historian at the University of Delaware in Newark, to revisit the classics that first made sustainability a public issue in the 1960s and 1970s.”
I luv it — India get’s it. You have to make sure that your IT foundation is solid first before unleashing things like AI. Connected AI requires a solid and secured infrastructure foundation 1st. In order for customers to buy into Cloud & the whole IoT, and connected AI set of products and services; the customer must feel that they can trust you fully.
By Jayadev Parida
Take a stock of the past, analyse the present cliché and frame a strategy for future. In the recent years, India’s approach to cyber security has experienced a shift from style to substance. Prime Minister Modi’s foreign policy has made various strong interventions on cyber security matters. Those interventions need to be materialised to manoeuvre the interest. Presumably, the Prime Minister Office (PMO) is likely to invest both political and capital energy to enhance a cautious cyber-strategy. A dedicated Division in the Indian Ministry of External Affairs (MEA) for cyber security is a value addition to that. In 2015, Minister of Communications and Information Technology in a written reply to the Lok Sabha stated that government allocated Rs 755 crore to combat cyber security threats over a period of five years. But, this financial outlay is quite negligible as the nature of threat is quite huge and unpredictable.
Cheer up, the worst is yet to come! One of those famous words penned by noted American author and novelist Mark Twain a long ago. This sentence is a stark reminder of India’s dawdling approach to new threats. India’s cyber sleuth may be holding their nerves for the worst to frame a robust apparatus to secure cyber ecosystem. The Google Trends of 2015 demonstrated that Islamic State (IS) was a buzz word in India while terrorism continued to exist as the area of concern. Nonetheless, interest over the time for IS’ in Indian Cities is increasing significantly.
China goes 5G.
China Mobile has launched its 5G Joint Innovation Center project, the company said.
The company has set a business target of reaching 1.40 million TD-LTE base stations, selling 330 million 4G devices and expanding the 4G subscriber base to over 500 million by the end of 2016.
According to Shang Bing, Chairman of China Mobile, the company has deployed 1.10 million TD-LTE base stations as of the end of 2015, covering over 1.2 billion population and has achieved 4G roaming with 114 countries and regions; China Mobile sold 300 million TD-LTE devices in 2015, indicating the addition of more than 400 TD-LTE users every minute; China Mobile´s 4G subscriber base reached 340 million, accounting for about 30% of global number. Moreover, China Mobile has completed the deployment of carrier aggregation (CA) in over 300 cities and has commercialized VoLTE services in 100 cities.
US Military’s new toys to show off in front of China and Russia.
Little noticed amid the daily news bulletins about the Islamic State and Syria, the Pentagon has begun a push for exotic new weapons that can deter Russia and China.
Pentagon officials have started talking openly about using the latest tools of artificial intelligence and machine learning to create robot weapons, “human-machine teams” and enhanced, super-powered soldiers.
It may sound like science fiction, but Pentagon officials say they have concluded that such high-tech systems are the best way to combat rapid improvements by the Russian and Chinese militaries.