The Internet of Everything, cloud computing/big data and 3-D printing are the three technologies most likely to transform the world during the next five years, according to IHS Technology.“We know that technology has the capability to change the world: from the Gutenberg printing press to the steam engine to the microchip,” said Ian Weightman, vice president, research & operations, IHS Technology. “But how can we determine which technologies are likely to have the greatest potential to transform the future of the human race? What is the process to distinguish among the innovations that will have limited impact and those that will be remembered as milestones on the path of progress? How can you tell the difference between the VHS and Betamax of tomorrow’s technologies?”“To answer these questions, IHS Technology gathered its leading experts representing the technology supply chain from electronic components to finished products across … [Read more...] about IHS identifies technologies to transform the world over next five years
Simulation more than $65 billion a year.The foundation of this industry's success has been the development of progressively more capable chips. However, according to the International Technology Roadmap for Semiconductors (ITRS), which identifies technological challenges and needs for the semiconductor industry over the next 15 years, signs point to a disruption in these long-running trends.Transistor size will continue to decrease for a decade, reaching approximately five nanometers long and one nanometer (or about five atoms) wide in its critical active region. Beyond that point, what happens is harder to predict.At this nanoscale, new phenomena take precedence over those that hold sway in the macro-world. Quantum effects, such as tunneling and atomistic disorder, dominate the characteristics of these nanoscale devices. Fundamental questions about how various materials and configurations behave at this scale need to be answered."Further improvements in these dimensions will come only … [Read more...] about Designing the Building Blocks of Future Nano-computing Technologies
Influencer marketing has become an area of strategic importance for marketing departments, according to a white paper Traackr published Thursday.B2B technology companies are aware of the trend, according to the paper's coauthor, business consultant Mark Schaefer, but they lag in implementing influencer marketing programs.Interviews with 10 marketing experts -- including some who built influencer marketing programs at Microsoft, IBM and Samsung -- suggest that influencer marketing requires a fundamental shift in the marketing department, noted Traackr CMO Kirk Crenshaw.Companies have to rethink how to go to market, he said. They also must acquire new skills, reconfigure measurement methods, and relinquish at least partial control of the message.Trust in the subject matter experts is critical. Experts interviewed for the paper highlighted six industry trends that currently are shaping B2B influencer marketing:emergence of micro-influencers and their role vis-a-vis … [Read more...] about Experts Identify 6 Emerging Influencer Marketing Trends
The 911 emergency number was created back in the day when telephones were connected by wires, before cellphones or VoIP (Voice over Internet Protocol) in the home, and before Multi-Line Telephone Systems (MLTS) in the enterprise.In the early days, anyone could dial 911 for police, fire or medical emergencies. However, in 2017, dialing 911 unfortunately is no guarantee that a call for help will reach a 911 service that can identify the location of the caller immediately. As a matter of fact, when consumers dropped land lines and started using Internet phone services like Vonage, a 911 problem surfaced.A Vonage phone was hooked up to the Internet, and no physical location was connected. So after litigation Vonage (and other competing services) changed the requirements to use the service, obligating customers to register their physical addresses. MLTS raised a different, but equally problematic, issue.Kari Hunt in 2013 was stabbed repeatedly by her estranged husband in a motel room in … [Read more...] about TECHNOLOGY LAW CORNER Kari’s Law: A 911 Fix That Will Make the US Safer
There are times when it seems like technology can work almost too well. Now, if working too well sounds to you like an impossibility -- along the lines of being too rich or too good looking -- reflect that there's more to a technology than end-user experience.In addition to the experience of using the technology, there are other considerations that play a role: things like maintenance, operations and ongoing support. While these considerations are less directly visible to the enterprise end-user, they are nevertheless important -- and when you have a technology that's ubiquitous, where operation is transparent, and where the experience (to the end user, at least) is close to frictionless, awareness that the technology even exists can fade into the background.Consider the plumbing in your home. Unless something major is wrong, chances are good that you don't give much serious thought to the specific mechanics of how your plumbing works. When there's an issue, you care very deeply -- … [Read more...] about ANALYSIS ‘Invisible’ Technologies: What You Can’t See Can Hurt You
Using personal devices to conduct business has become commonplace, whether employers require it or employees voluntary do so. The use of personal devices creates a privacy challenge. Employers want access to the devices, and employees want to protect their personal data contained on them.The term "devices" itself is deceiving. Many consider employee-owned devices to be smartphones and tablets, as the term "BYOD" (Bring Your Own Device) implies. However, BYOD also includes laptops and desktop computers at home.Research companies in the BYOD space have proposed a solution to these privacy issues. Also, a California court recently addressed the issue of whether employers should reimburse employees who use their own devices for business. Webroot in July issued its BYOD security report, "Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)." Some of the issues addressed include privacy concerns such as "employer access to personal data, personal data … [Read more...] about TECHNOLOGY LAW CORNER BYOD Privacy: Do Employees Have Rights?
Protecting the data in electronic health records did not start with the advent of HIPAA -- the Health Insurance Portability and Accountability Act of 1996 -- as many people think. Protecting health records has been a critical requirement in the healthcare space since the computers became a fixture in hospitals. However, HIPAA added public reports of fines issued for covered entities' failure to properly protect data contained within EHRs.Many people assume that EHR data has limited value to unauthorized users. (Who cares about my blood test results, or that I just visited my dermatologist?) Understanding their value is quite simple, though. In addition to personal health information, or PHI, EHRs contain Social Security numbers, which never expire -- and cybercriminal use of SSNs is not easily detected.Stealing EHRs is better for cybercriminals than stealing credit cards, which can be used only until the card expires, is maxed out or canceled, according to a Trend Micro study released … [Read more...] about TECHNOLOGY LAW CORNER Why Are Health Records So Valuable to Cybercriminals?
Even though D-Link expressly promised that many of its wireless devices had the highest level of security available, the Federal Trade Commission last month filed a lawsuit that alleges otherwise.The FTC filing includes copies of online marketing materials and technical specifications for D-Link's products (including its digital baby monitor and wireless routers), and flatly declares that "thousands of Defendants' routers and cameras have been vulnerable to attacks that subject consumers' sensitive personal information and local networks to a significant risk of unauthorized access."It has been the role and responsibility of the FTC to protect U.S. consumers since it was established in 1914 -- long before the existence of the Internet or the Internet of Things. The FTC's original purpose was to prevent unfair methods of competition in commerce as part of the battle to "bust the trusts." Then in 1938, Congress further broadened the FTC's enforcement powers to protect consumers against … [Read more...] about TECHNOLOGY LAW CORNER FTC’s Lawsuit Should Make You Feel Very Insecure About the IoT
Harvey Weinstein just went from most powerful man in Hollywood to punching bag -- and while he deserved this, perhaps greater attention should go toward taking aggressive measures to prevent future Weinsteins -- and there will be future Weinsteins.We need to stop acting surprised when this stuff comes out and instead take stronger steps to prevent this kind of thing in the future. Given how widely known this behavior evidently was, it is hard not to argue that Weinstein's board also may be responsible, something I expect few other boards will miss.While we lament the increasing loss of privacy that comes with technological advances, there is a decent chance that future predators can be identified early in their careers and either trained to refrain from this behavior, become unemployable, or be institutionalized far more rapidly.In short, some of the future technology that may seem scary also could make a lot of people substantially safer.I'll focus on what didn't work with Weinstein, … [Read more...] about OPINION Fighting Off the Harvey Weinsteins of the World Through Technology