Category: Cloud

Google spies on you, recording your voice when you are not expecting it to

Android devices have an “Ok, Google” voice activation feature. This enables voice input of search and other functions on your Android device. Google also records a copy of the audio when it does this. Google also occasionally records incidental audio having nothing to do with a search. It certainly has for me. You can manually delete the records, one by one, which is very time consuming. You need to go to this Google page and...

Botnot of #IOT devices used in #DDoS attack on web site

Botnot of #IOT devices used in #DDoS attack on web site

Preliminary indications are that the DDoS attack used, in part, a network of unsecured IoT devices. The 620 Gbps DDoS attack was built on a massive botnet. Source: Renowned blog KrebsOnSecurity hit with massive DDoS attack – Computer Business Review Related articles Attackers Combine Three Botnets to Launch Massive DDoS Attack IoT home routers used to launch application-level DDoS attack DDoS of Things – GlobalDots Blog Symantec identifies IoT security risks More IoT botnets connected...

The role of the CIO in the future

The role of the CIO in the future

With high tech readily available “off the shelf” and probably from an outsourced cloud service, what is the role of the CIO in 10 or 15 years? A world where IT is perceived as essential but not strategic is an ugly place to be. Source: The CIO is becoming the HVAC guy | Computerworld The author suggests the role of the future CIO is to provide a smorgasbord of IT options from which others can...

Facebook Experiments With Disappearing Posts 0

Facebook Experiments With Disappearing Posts

Facebook Experiments With Disappearing Posts. Enables you to post something with an expiration date and time. Many users of FB do this now but manually: they post a topic, and when challenged on the accuracy of the topic or post, they delete it. This enables the spread of inaccurate views intended to influence others while simultaneously avoiding challenges. In the field of propaganda, the first message that consumers receive is the one most likely to stick, even when...

The challenge of health information data normalization

The challenge of health information data normalization

Different facilities and doctors use different terminology to describe the same things which makes the exchange of patient data difficult: Until the data is normalized, the true potential of HIEs will be stunted. That potential lies in the ability to instantaneously act on the exchanged information. Ideally, two doctors sharing the same patient will be able to automatically absorb each other’s separate patient data. via Health Information Exchanges Lack Standards – Healthcare –. Providers used...

Bad Behavior has blocked 219 access attempts in the last 7 days.