Some industries are slow to adapt their products to meet the changing demands of today’s consumers. Home security is one of those industries. Once the first models were built, they remained virtually unchanged long enough to become ineffective.The way people live today is not the same as it was fifty years ago. Today, people frequently travel outside their homes for extended periods of time and want to know that their property is safe. They’re used to having immediate contact with friends and family through smartphone apps, and expect the same from their home security system.Home security started out as a brilliant inventionIn the 1800s, the invention of the telegraph and battery inspired hobbyists and electrical engineers to pursue ways of improving telecommunication. Around this time, a Unitarian minister from Boston named Agustus Pope began inventing the first burglar alarm. Contemplating the dilemma of how to get his electronic invention to ring a bell, he found the … [Read more...] about Is AI going to save the home security industry?
No one can deny it: services is a people business! But technology can enhance services, or even take over certain tasks. In particular, the technologies that enable Digital Transformations can have a big impact on how services are delivered, and on the customer experience. Here are eight ways in which technology is changing IT services: 1. Search: When customers need help, their first instinct is to search online. Vendors should make sure their online company and product information is easy to find and that it’s optimized for search, so that the most relevant results appear first. Ideally, that information will be located on the vendor’s website, prompting visitors to go there. 2. Chatbots. Most vendor websites offer the option to chat online. Often, though, users are chatting not with a human service rep but with a software program, called a chatbot. Simple chatbots use a set of programmed instructions … [Read more...] about Eight Ways Technology is Changing the Service Industry
Most ERP software was built first for manufacturers. But the services industries (including architecture, engineering, legal and advertising) have a different set of ERP needs, according to a buyer's guide prepared by Technology Evaluation Centers (TEC). The 45-page report uses Microsoft's definition of the services sector: "Talent-driven, project-centric and intellectual capital intensive." Consequently, the report says, it is imperative that ERP software for services be project-based, unlike ERP for the manufacturing sector, which is product-based. Buyers' top priorities for ERP software in the services industries include project planning and execution, resource utilization and managing project costs, the report says. The software suite also needs a strong CRM component, says TEC senior research analyst Ted Rohm. The TEC report includes extensive charts comparing the features of various ERP software suites; discusses trends in social, mobile, analytics and cloud technologies; and … [Read more...] about How to select ERP for the services industries
Open source in general, and Unix in particular, appears to be far buggier and less secure than is Microsoft's code in general and Windows XP in particular. You might not believe that, but any count of security vulnerabilities reported since about mid-2001 will lead you to the same conclusion. Mentions of Unix (including Linux, BSD and Solaris) outnumber mentions of Microsoft products by more than two to one across the major security databases. There are several reasons for this. Superficially, it's simply easier and safer to review open-source contributions than Microsoft's work. You don't have to read hex or use a decompiler, and nobody sues you for publishing your findings. Less obviously, open-source code is easier to get than Windows code and there's a lot more of it. Blastwave.org, for example, now offers more than one thousand freely downloadable packages for Solaris, all of which appear to have been studied by security industry organizations hunting security weaknesses in Unix … [Read more...] about The Security Industry: Where Objectivity Is a Lie
What do field sales employees, medical personnel and home-office workers connecting remotely to a central site have in common? A need for up-to-the-minute information. As a common method for near-instantaneous business communication, e-mail can be sent and received in many ways -- via pagers, cell phones and the like. One option that holds especial promise for increasing the timeliness of information flow is Web-based e-mail. However, many businesses choose not to deploy Web mail because of the perceived security risk of Web-based applications in general. Understandably, companies do not want to increase the risk of exposing corporate e-mail systems to external threats. Viruses, spam, worms and other events, both malicious and non-malicious, can bring e-mail infrastructures to their knees. And with recent government legislation in countries such as the United States, e-mail confidentiality has become a growing concern. So, what approaches can a company consider for deploying Web mail … [Read more...] about Tackling the Secure Web Mail Challenge
By Jack M. Germain Jan 25, 2007 4:00 AM PT Secure Computing has been delivering solutions for Internet security for 20 years. With more than 11,000 global customers, the company offers support by a worldwide network of partners. The company is headquartered in San Jose, Calif., and has sales offices worldwide. Secure Computing has gone through huge changes since last year. It had 38 employees and quickly took on 500 more after two critical acquisitions. Secure Computing acquired CyberGuard and CipherTrust, and now integrates its overlapping security products to enhance its application gateway and Web gateway offerings. John McNulty, who serves as chairman, president and CEO of Secure Computing, discussed with TechNewsWorld his views on the issues facing the Internet today. TechNewsWorld: How confident are you about economic life on the Internet? John McNulty: It is early in the Internet's growth cycle. It is still too soon in seeing the true potential for commerce on the Internet. … [Read more...] about Secure Computing CEO McNulty: What Drives the Malware Industry?
It's quiet on the streets of San Francisco today, the first day of the RSA Security Conference, being held at the Moscone Convention Center south of Market Street. Traffic on the streets is light, so either the cops are doing a good job redirecting the crazy San Francisco traffic, which in this area can almost rival that of New York, or the gloomy economic news has trickled down to the streets. In Moscone Center North, however (yes, there is a Moscone Center South, and a Moscone Center West), at the registration hall, things are pretty lively, all things considered. This is, after all, the early part of the first day, and people who attended the get acquainted-party last night are probably reaching for the aspirin right now. The conference and an associated exposition will be held through Friday. Lights! Action! Meanwhile, downstairs, a woman is setting up six PCs for the Security Smackdown next to the doors to the press section, code-named the "Yellow Rooms." Come back, Bill … [Read more...] about Live From RSA: Getting Ready for the Security Smackdown
Well it's been a jubilant few weeks here in the Linux blogosphere, thanks largely to some of the spectacularly sane decisions coming out of the tempestuous case of Oracle v. Google. There have been parties in the streets, celebrations in the cafes, and rowdy songs aplenty being sung down at Linux Girl's favorite Punchy Penguin Saloon. So exuberant have been the celebrations, in fact, that Linux Girl quickly lost track of time amid all the revelries. Late last week, more than a few Tequila Tux cocktails later, she lifted her head from the bar once again only to find the mood had shifted dramatically. 'Signed With a Microsoft Key' "Microsoft will be offering signing services through their sysdev portal," wrote Red Hat developer Matthew Garrett in a blog post late last month. "It's not entirely free (there's a one-off $99 fee to gain access), but it's cheaper than any realistic alternative would have been. It ensures compatibility with as wide a range of hardware as possible and it … [Read more...] about Dangerous Concessions: Red Hat, Fedora and the Secure Boot Shocker
It was a fall day in 2005, and Mark Gorton was feeling chilled. He was sitting in a conference room high above the streets of New York City. Around a table sat six executives from major recording labels. The suits eyeballed Gorton, a clean-cut 37-year-old with short dark hair and bushy eyebrows. With electrical engineering degrees from Yale and Stanford and an MBA from Harvard, Gorton hardly fit the stereotype of the renegade hacker. By day, Gorton works as a Wall Street player, running his Tower Research Capital and its affiliate Lime Brokerage, with a combined staff of 30 employees, out of a sprawling office in lower Manhattan. But in one corner of the place he has a team of coders working on his more controversial operation, LimeWire, the peer-to-peer software that has turned this mild-mannered engineer into the music industry's most-wanted geek. According to the NPD Group, in Port Washington, N.Y., LimeWire is the leading peer-to-peer (P2P) program-with 62 percent of the … [Read more...] about The Music Industry Wants to Kill LimeWire
This is a guest post. The views expressed here are solely those of the author and do not represent positions of IEEE Spectrum or the IEEE. Just over a year ago, New York Times columnist Paul Krugman wrote a much-discussed piece on the discrepancy between corporate profits and labor compensation. The column sparked a huge debate, and on the Times website alone readers left more than 1,300 comments. The part that interested me, however, wasn't the discussion on capital versus labor. What caught my attention was a comment Krugman made about robotics. He referred to it as a capital-intensive technology. It may not sound like a big deal. The problem is, it isn't true. The claim that robotics is capital intensive is a myth that needs to be debunked. This isn't just an academic curiosity. Capital intensive means that a lot of money is required to make money, usually because you have to own a lot of assets-cash, buildings, equipment-to be in the industry. Examples of capital-intensive … [Read more...] about The Greatest Myth About the Robotics Industry
In 1973, the American sociologist Daniel Bell, in his book, The Coming of the Post Industrial Society [pdf], predicted that advanced societies would change from being based on manufacturing of goods to ones in which knowledge workers would occupy a central position. This did happen, but because of the meteoric rise of information technology, the development of the Internet, and the widespread adoption of cellphones, the change has been far beyond expectations. These technologies are changing not only society, but the economic models on which society is based. Jeremy Rifkin, noted economic and social theorist and himself the author of 20 books, remembers Bell's book very well: "Think about what has changed, it is amazing," Rifkin, told Spectrum from his hotel in Berlin during a visit to Germany in March. Rifkin was in Germany to meet with politicians, government ministers, and industrialists. He delivered the keynote address on 26 March at the Berlin Energy Transition Dialogue 2015, … [Read more...] about Jeremy Rifkin on the Internet of Things and the Next Industrial Revolution
Companies are losing the battle to secure their IT systems from attacks by hackers and other threats, warned Bruce Schneier, the founder and chief technology officer of Counterpane Internet Security. "I don't think, on the whole, we are winning the security war; I think we are losing it," Schneier said in a speech, which was webcast Wednesday at the Hack In The Box Security Conference (HITB) in Kuala Lumpur, Malaysia. As systems get more complex, they get less secure, according to Schneier. Even as security technology improves, the complexity of modern IT systems has increased at a faster rate. [ Roger Grimes' free and almost foolproof way to check for malware. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]"The Internet is the most complex machine ever built," Schneier said. "This explains why security is getting worse." In addition, the nature of the threat that companies face has changed in important ways. Where hacking was once considered a … [Read more...] about Are we losing the security war?
My former boss at Foundstone, Mark Curphey, has moved on from Foundstone and into his holiday house in the South of France while he builds a prototype for a new start-up. Man, I want to move on like that. --Caution: Links contain some words that may not be appropriate for some audiences.--- As the leader of Foundstone and serious crypto guy, Mark has some interesting observations. While his own new blog has some serious security stuff and will be following the ups and downs of a brand new start-up, he has also started a blog poking fun at the security industry in general. Each week they publish a cartoon via RSS. In future they will have online Bulls--t Bingo which will drive a BullBoard Top 10. [ Also from InfoWorld: The 10 Windows group policy settings you need to get right. | Survive and thrive with the new OS: The ultimate Windows 10 survivor kit. | Stay up on key Microsoft technologies with the Windows newsletter. ]The cartoons are an indicting, inside look at the computer … [Read more...] about Dilbert Meets The Computer Security Industry
Corporate IT executives need to beware the seven dirty secrets of the security industry that can undermine the safety of business networks, a security expert told attendees at Interop Las Vegas. "It's best to have a healthy level of skepticism about what security vendors are trying to tell you," says Joshua Corman, principal security strategist for IBM/ISS, which itself is a security vendor. He called his talk "Unsafe at any speed: 7 Dirty Secrets of the Security Industry," harkening back to the 1960s Ralph Nader book about automobile safety, Unsafe at Any Speed. Nader's book took car makers to task for worrying more about cosmetic improvements than upgrades to make cars more safe. [ Security expert Cricket Liu lays out the workings of a DNS-based DDoS attack -- and how to prevent one from hitting your company. Download the PDF today! | Stay up to date on the latest security developments with InfoWorld's Security Report newsletter. ]Security vendors have at times invested development … [Read more...] about 7 dirty secrets of the security industry
For Mac OS X users worried about security, the latest upgrade to Apple's operating system should be enticing. Unlike the last update, Mac OS X 10.6 Snow Leopard, Lion brings a number of key missing security features to the platform. Mac OS X 10.7 includes a complete implementation of the anti-exploitation feature known as Address Space Layout Randomization (ASLR), better sandboxing of applications, and full disk encryption. "They have been playing catch-up to Microsoft, but they more or less have everything that is standard now," says Charlie Miller, a security consultant at Accuvant and co-author of "The Mac Hacker's Handbook." [ Safeguard your data! The tools you need to encrypt your communications and web data. • Maximum-security essential tools for everyday encryption. • InfoWorld's encryption Deep Dive how-to report. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]Miller started looking into the security of Mac OS X in 2007 because it … [Read more...] about Mac OS X Lion makes the security grade
The myriad threats to public, private and U.S. government networks is getting a ton of attention in Washington, D.C., this week as the House gets ready to debate yet another cyber security bill. At a hearing -- "America is Under Cyber Attack: Why Urgent Action is Needed" -- a number of security experts spoke about the impact of attacks on the critical IT systems that make companies and the country run. [ Also on InfoWorld: Concerns about CISPA cyber security bill spread. | Learn how to secure your systems with InfoWorld's Malware Deep Dive PDF special report and Security Central newsletter, both from InfoWorld. ] [ Roger Grimes' free and almost foolproof way to check for malware. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]MORE: From Anonymous to Hackerazzi: The year in security mischief-making "It is difficult to overstate the potential harm these threats pose to our economy, our national security, and the critical infrastructure upon which our … [Read more...] about Who is threatening the security of your network?
IT pros usually know where the bodies are buried. Sometimes that's because they're the ones holding the shovel. We asked InfoWorld readers to reveal the dirtiest secrets of IT -- the less-than-white lies and dark sides of technology that others may not be aware of. We then ran those "secrets" through a BS detector, fact-checking them with experts in the relevant field. In some cases the experts concurred, in other cases they did not. [ Also on InfoWorld: Take heed, young techies, of these 10 hard-earned lessons of a lifetime in IT and beware these 7 fatal IT mistakes that will get you fired. | Think you got it bad? Check out InfoWorld's dirty IT jobs hall of shame for a dose of perspective. | Get a $50 American Express gift cheque if we publish your tech tale from the trenches. Send it to [email protected] ] [ Give yourself a technology career advantage with InfoWorld's Deep Dive technology reports and Computerworld's career trends reports. GET A 15% DISCOUNT through Jan. 15, … [Read more...] about 6 dirty secrets of the IT industry
Ask a security professional about infosec challenges, and you'll get an earful of complaints about everyone else: Users click on bad links and open attachments, developers release buggy code, IT lags in applying software patches, the C-suite doesn't understand security priorities, and so forth. But the truth is IT is figuring out how to work with developers, and today, many enterprises are starting to take user training seriously. In fact, security professionals fail to collaborate because they're too busy pointing out all the things everyone else is doing wrong. [ Expand your security career horizons with these essential certifications for smart security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]Case in point: Last week, when I was at the RSA Conference in San Francisco, the DeveloperWeek conference was underway nearby. At the latter conference, I could find only one security-related talk on the schedule: Pete Chestna, Veracode's … [Read more...] about The real problem with the security industry
“It looked very suspicious,” M says of an anonymous e-mail she and several other journalists received late in 2014. It promised a scoop about a government scandal, but something just didn’t sit right with her. Soon after, strange things started happening on her computer. “I remember clearly not being able to connect via Skype to give an interview about torture,” she says. “There was somehow interference and I had to use someone else’s phone.” After passing a file attached to the e-mail to security experts, M learned that she and her coworkers had been targeted with Remote Control System (RCS), a sophisticated piece of spying software developed by a small Italian company called Hacking Team. Later, she would find out that it was being used against her by her own government, which likely objected to her reporting. M spoke on condition of anonymity because she fears further reprisals. M is just one of probably thousands of people who have … [Read more...] about The Growth Industry Helping Governments Hack Terrorists, Criminals—and Political Opponents
A claim by Wikileaks that documents it released last week provide evidence of a “secret new industry” of mass surveillance was as breathless as previous pronouncements from Julian Assange’s organization. But the material does provide a stark reminder that our online activities are easily snooped upon, and suggests that governments or police around the world can easily go shopping for tools to capture whatever information they want from us. The take-home for ordinary computer users is that the privacy and security safeguards they use—including passwords and even encryption tools—present only minor obstacles to what one researcher calls the “cyber security industrial complex.” “There is no true privacy in any computing systems against determined government-level surveillance,” says Radu Sion, a computer scientist at Stony Brook University who directs its Network Security and Applied Cryptography Laboratory. He says that as computing … [Read more...] about The Cyber Security Industrial Complex