Prominent healthcare executives are predicting a drastic shift from on-premise IT infrastructure into the cloud. That includes electronic health records, clinical decision support and analytics.
For Silicon Valley, the headline was sweet nectar: Google DeepMind, the world’s hottest artificial intelligence lab, embraces the blockchain, the endlessly fascinating idea at the heart of the bitcoin digital currency.
But the buzzwords bely the reality. The lab’s re-imagining of the blockchain has very little to do with AI—or the blockchain, for that matter.
NIO, an electric vehicle startup backed by Chinese venture capitalists, unveiled its first self-driving car concept at SXSW this weekend.
The NIO EVE is a “mobile living area” as much as a vehicle, and has been designed to accommodate long family journeys. The interior has reclining seats that can fold into beds and front seats that can rotate to face the back seats.
WikiLeaks this week published a trove of documents that appears to detail how the Central Intelligence Agency successfully hacked a wide variety of tech products, including iPhones, Android devices, Wi-Fi routers and Samsung televisions.
When Zach Halmstad looks at the under-construction Confluence Arts Center, the software entrepreneur sees more than a performing arts building.
He sees a big part of the future of downtown Eau Claire.
“This is economic development through the arts,” said Halmstad, who launched Jamf Software in the early 2000s with a couple of friends and has since led its growth to 600 employees, 10,000 customers and eight offices worldwide.
The story of Jamf and the renaissance of downtown Eau Claire has flowed together, much like the confluence of the Chippewa and Eau Claire rivers in that western Wisconsin city of 64,000 people.
Cybersecurity incidents continue to grow in both volume and sophistication, with 64 percent more security incidents reported in 2015 than in 2014, according to a June 2016 report by the Ponemon Institute. The human instinct is to try to find those responsible. However, any attempt to access, damage, or impair another system that appears to be involved in an attack is mostly likely illegal and can result in civil and/or criminal liability. Since many intrusions and attacks are launched from compromised systems, there’s also the danger of damaging an innocent victim’s system.
The technology’s implications for interoperability, privacy, claims processing and more are intriguing. But many challenges must be addressed before wider applications become possible.
Viewed from afar these days, it might be easy to conclude that life in Washington, D.C., has become a reality show gone awry.
Cabinet-level nominees stepping down amid claims of wrongdoing; a president seemingly at war with the press and members of his own team; an intelligence community at odds with the source of its authority; and a bureaucratic “swamp” that refuses to be drained.
Not to be overlooked, however, are the real issues facing Congress, the White House and the nation as the hard work of governing marches on.
I recently returned from a vacation to find that Google’s algorithms had created a customized slide show of my trip. I hadn’t asked for one. But the company’s software robots apparently noticed I’d traveled somewhere and taken a flurry of photos, which likely indicated I’d been vacationing. Now, I actually enjoy some of Google’s simpler customization tools, like autocomplete. But this unbidden slide-show curation seemed too humanlike. The machine had anticipated desires I didn’t have yet. I actually yelped when I saw it.