Toggle light / dark theme

CREECH AIR FORCE BASE, Nev. (AFNS) -
Remotely piloted aircraft don’t fly themselves as autonomous super machines. They also don’t require only a single pilot and sensor operator to function.

The RPA enterprise of MQ-1 Predators and MQ-9 Reapers is maintained or operated by Airmen from more than 30 Air Force career fields, each one playing a key role in supporting every combat air patrol. The patrols enable combatant commanders access to intelligence, surveillance and reconnaissance capabilities at all times.

A combat air patrol is essentially having an aircraft in the air, providing joint combatant commanders with dominant ISR and real-time munitions capability. Today, the RPA enterprise flies a total of 60 CAPs in a 24-hour period requiring thousands of Airmen from pilots and sensor operators to maintainers, intelligence personnel and weather forecasters.

Read more

Nice concept; however, given the recent warnings for 2016; I hope that IDC and others are not overwhelmed as well as able to meet their client’s expectations. My concern is expectations by policy holders as well as leaders operating in a mode of false sense of security and ignoring warnings that they would have focused on closely without the insurance.


New report offers insight into some of the tools and models available today to help insurers expand into this emerging market, balance their risk portfolios, and maintain a positive outlook

FRAMINGHAM, Mass., March 15, 2016 – Increased digitization and interconnectivity have catapulted the risk of cyber threats as one of the top global perils of 2016 and beyond. To combat this risk, many companies will look to insurance as a critical risk management technique that complements improved cyber security measures. IDC Financial Insights outlines the tremendous opportunities for insurers to capitalize on this largely untapped market in a new report, Perspective: Cyber Insurance — Can Technology Help Insurers Overcome Their Skepticism? (Doc #EMEA41044816), and emphasizes some of the tools and models that can help insurers effectively penetrate the emerging market while balancing their risk portfolios.

Read more

Beam me up Scotty. Alright, now that we got that out of the way, let’s get to the hard facts. German scientists have developed a way to transport information across a physical distance instantly. No one is jumping the gun quite yet, but it seriously looks as if scientists have discovered how to teleport.

Humans May Soon BE Able TO Teleport

It’s crazy that headline even exists, but one shouldn’t complain. In technical terms, the process known as quantum teleportation has been known for quite some time. To teleport in the quantum level is nothing new, but to teleport in the classical world, well, that’s just fascinating. Of course, teleportation in the classical world is done using uniquely entangled laser beams. By using spinning, polarizing plates, scientists have proven that laser beams can thus be entangled. In the study, the team used information of a specific laser direction and transmitted it. What came out on the other end was an instant transmission of the laser beam at a short distance.

Read more

Automated online advice platforms, the so-called robo advisors, have long implied the use of algorithms eliminates conflicts of interest. It’s a premise that’s gained traction with both consumers and regulators. But a new report by the Financial Industry Regulatory Authority casts doubt on their ability to do just that.

With robo advisors like Schwab Intelligent Portfolios, Betterment and Wealthfront now managing billions of dollars worth of client assets, FINRA investigated these online advice providers. The regulator released a report Tuesday that evaluated several key service areas including governance and supervision, the suitability of recommendations, conflicts of interest, customer risk profiles and portfolio rebalancing.

FINRA found that while digital advice will likely play an increasingly important role in wealth management, investors should be aware that conflicts of interest can exist even in providers powered by algorithms. Specifically, the advice consumers receive depends largely on the digital advice provider’s investment approach and the underlying assumptions used.

Read more

This study is bunk! And, here is the reason why: first, the robot was setup as a robot repeseanting as part of the facilities service where visitors/ people where at and followed the “facilities” robot as their escort in the building, much like you would do if I or someone else was wearing a building security jacket and badge who told you to follow us. So, this is very misleading study.


If you were in a burning building and a robot appeared to rescue you, would you follow it?

A new study out of Georgia Tech Research Institute (GTRI) found that the answer is yes — even if it isn’t in your best interest.

Very concerning: 72% of all India companies were hacked in 2015. How many were hosting consumer and business data for non-Indian companies say US or European companies?


According to KPMG’s, Cyber Crime Survey Report 2015, around 72 per cent of the companies in India have faced cyber-attacks in the year 2015. In India a spate of cyber security issues have been witnessed like the Gaana.com or Ola Cabs apps being hacked. Such issues have raised the alarm for the whole enterprise community. And it doesn’t seem to be stopping here. According to a report from McAfee Labs, the number of cyber attacks where malware holds user data hostage is expected to grow in 2016 as hackers target more companies and advanced software is able to compromise more types of data. In many cases the objective would be financial gain or corporate espionage, either ways, resulting in heavy losses for the enterprise.

Today, no single new age enterprise is immune to cyber threats. The humongous amount of information popping out of various social and mobile platforms continues to add to organizations’ vulnerabilities, making them attractive targets for complex cyber crimes.

For today’s digital businesses, a lot of value is tied to data and any loss to it can put their whole reputation at stake. Hence more and more companies are finding themselves terrorized by cyber threat agents who are looking for new, sophisticated routes to gain access to confidential business data. Burgess Cooper, Partner, Information & Cyber Security Advisory Services, EY, points out, “Technology is increasing a company’s vulnerability to be attacked through increased online presence, broader use of social media, mass adoption of mobile devices, increased usage of cloud services and the collection/analysis of big data.”