How much do you know about your medical identity? You know you’re generally in good health. You know your height and your weight. You know if you have any chronic conditions. But can you remember how many tetanus shots you’ve had? Do you know which percentile your height placed you in for each year of life? Could you tell your doctor the exact amount of time you’ve been taking a prescription medication to the day?read more
Prominent healthcare executives are predicting a drastic shift from on-premise IT infrastructure into the cloud. That includes electronic health records, clinical decision support and analytics.read more
Wikileaks’ CIA dump is the biggest secret cache released so far. It’s embarrassing to the CIA. It undermines our intelligence efforts. And it didn’t need to happen.
The sad fact is that the world’s computers are not configured securely enough to match the confidentiality of the data they are protecting. As a society we allow our computers to languish in a state that almost invites attackers to access them—even at the CIA, apparently.read more
For Silicon Valley, the headline was sweet nectar: Google DeepMind, the world’s hottest artificial intelligence lab, embraces the blockchain, the endlessly fascinating idea at the heart of the bitcoin digital currency.
But the buzzwords bely the reality. The lab’s re-imagining of the blockchain has very little to do with AI—or the blockchain, for that matter.read more
NIO, an electric vehicle startup backed by Chinese venture capitalists, unveiled its first self-driving car concept at SXSW this weekend.
The NIO EVE is a “mobile living area” as much as a vehicle, and has been designed to accommodate long family journeys. The interior has reclining seats that can fold into beds and front seats that can rotate to face the back seats.read more
everal new iPad models have been spotted being tested in Cupertino and nearby locations, according to mobile marketing firm Fiksu — potentially confirming earlier rumors of a planned iPad refresh arriving this spring.read more
Many entrepreneurs, especially those who are Millennials or younger, focus on products or services designed for people like themselves. The list includes software applications of all descriptions, grab-and-go food and drink, wearables and “athleisure” products, to name a few.
That makes market sense given there are 75 million Americans between the ages of 18 and 34, and they aren’t often shy about spending on consumer goods and services.read more
WikiLeaks this week published a trove of documents that appears to detail how the Central Intelligence Agency successfully hacked a wide variety of tech products, including iPhones, Android devices, Wi-Fi routers and Samsung televisions.read more
AWS operations explains that it was tougher to restart its S3 index system this time than the last time they tried to restart it.
The Feb. 28 outage of Amazon’s Simple Storage Service says one thing loudly and clearly: Amazon Web Services is growing so fast that it must rely on its automated systems to keep operating. Sometimes things need to go awry in only a minor way, and the sheer scale involved puts those systems at risk of disabling it.read more
When Zach Halmstad looks at the under-construction Confluence Arts Center, the software entrepreneur sees more than a performing arts building.
He sees a big part of the future of downtown Eau Claire.
“This is economic development through the arts,” said Halmstad, who launched Jamf Software in the early 2000s with a couple of friends and has since led its growth to 600 employees, 10,000 customers and eight offices worldwide.
The story of Jamf and the renaissance of downtown Eau Claire has flowed together, much like the confluence of the Chippewa and Eau Claire rivers in that western Wisconsin city of 64,000 people.read more
Cybersecurity incidents continue to grow in both volume and sophistication, with 64 percent more security incidents reported in 2015 than in 2014, according to a June 2016 report by the Ponemon Institute. The human instinct is to try to find those responsible. However, any attempt to access, damage, or impair another system that appears to be involved in an attack is mostly likely illegal and can result in civil and/or criminal liability. Since many intrusions and attacks are launched from compromised systems, there’s also the danger of damaging an innocent victim’s system.read more
Something strange happens when you look into a crystal ball.
For some, it becomes easier to imagine roadblocks that don’t actually exist or that are not really insurmountable. Maybe it’s a way to create more hype by painting a dire picture or to build up a taller mountain to scale as a way to raise even more investment money. Who knows? It’s a problem I’ve seen many times in tech, where the naysayers get most of the attention.read more
Farming is getting smarter every day. From large commercial operations to local organic growers, technology is at the forefront of reducing cost, improving yield and guaranteeing optimal delivery to market. The key ingredient in smart agriculture is data.read more
The technology’s implications for interoperability, privacy, claims processing and more are intriguing. But many challenges must be addressed before wider applications become possible.read more
“Everybody and their mother is out to create their own specialized voice-activated devices,” IBM fellow and CTO for its Watson project Rob High told me during an interview at MWC. IBM, of course, doesn’t offer a direct competitor to Siri, Google Assistant or Alexa, but the company hopes that developers will choose Watson, in all its various guises, to power their AI apps, smart chatbots and similar services.read more
Only 29% of US businesses have cyber insurance; Deloitte outlines steps for insurance companies to improve risk models, communication, and policy sales.
Sales of cyber insurance policies are suffering from a lack of shared data about security incidents, too few standard definitions, and not enough focus on risk mitigation for insurers or customers, according to a report from Deloitte released this week.read more
Even as fanatic customers can be counted on to line up outside the Apple store for the latest iPhone, there are still millions of Americans who don’t use a smartphone at all. For that matter, there are still plenty of happy owners of tube televisions, rotary dial telephones, film cameras, fax machines, typewriters and cassette tape players.read more
Viewed from afar these days, it might be easy to conclude that life in Washington, D.C., has become a reality show gone awry.
Cabinet-level nominees stepping down amid claims of wrongdoing; a president seemingly at war with the press and members of his own team; an intelligence community at odds with the source of its authority; and a bureaucratic “swamp” that refuses to be drained.
Not to be overlooked, however, are the real issues facing Congress, the White House and the nation as the hard work of governing marches on.read more
Called the “largest interconnected machine,” the U.S. electricity grid is a complex digital and physical system crucial to life and commerce in this country. Today, it is made up of more than 7,000 power plants, 55,000 substations, 160,000 miles of high-voltage transmission lines and millions of miles of low-voltage distribution lines. This web of generators, substations and power lines is organized into three major interconnections, operated by 66 balancing authorities and 3,000 different utilities. That’s a lot of power, and many possible vulnerabilities.read more
I recently returned from a vacation to find that Google’s algorithms had created a customized slide show of my trip. I hadn’t asked for one. But the company’s software robots apparently noticed I’d traveled somewhere and taken a flurry of photos, which likely indicated I’d been vacationing. Now, I actually enjoy some of Google’s simpler customization tools, like autocomplete. But this unbidden slide-show curation seemed too humanlike. The machine had anticipated desires I didn’t have yet. I actually yelped when I saw it.read more