December 13, 2015

Cyberattacks will compromise 1-in-3 healthcare records next year

"Frankly, healthcare data is really valuable from a cyber criminal standpoint. It could be 5, 10 or even 50 times more valuable than other forms of data," said Lynne Dunbrack, research vice president for IDC's Health Insights. Not only do healthcare records often have Social Security and credit card numbers, but they are also used by criminals to file fraudulent medical claims and to get medications to resell. Healthcare fraud costs the industry from $74 billion to $247 billion a year in the U.S., according to FBI statistics. Fraudulent billing represents between 3% and 10% of healthcare expenditures in the U.S. each year, Dunbrack said.

China Wants to Replace Millions of Workers with Robots

A more comprehensive effort to upgrade China’s manufacturing base is already underway, under a program announced in May known as Made in China 2025, which aims to make China an innovative and green “world manufacturing power” by that year. The effort involves adding connectivity and intelligence to manufacturing equipment and factories, to improve overall flexibility and efficiency. It was inspired by Germany’s Industry 4.0 effort, launched in 2011, and by similar efforts to promote more advanced manufacturing in the U.S. The robotic component of this overhaul will be about more than just installing more robots in manufacturing plants, however.

Pixel C deep-dive review: A terrific tablet that tries to be more

At its core, the Pixel C is a 10.2-in. tablet -- and in that regard, it's a pleasure to use. The metal casing feels smooth and luxurious under your fingers. At 1.1 lb., it isn't the lightest tablet around, but it seems strong and sturdy and is quite comfortable to hold (using two hands, which is pretty much par for the course with a device of this size). The slate is relatively thin, too, at 0.28 in. -- a touch slimmer than Apple's original iPad Air and just four-hundredths of an inch thicker than the newer iPad Air 2. Staying true to the Pixel name, the Pixel C's display is gorgeous -- a 2560 x 1800 LCD panel that's impossibly crisp and detailed. It's super bright, too, to the point that I've actually found myself using it at the lowest possible brightness setting most of the time.

Prioritize your optimization ideas and build a roadmap

Your prioritization criteria should be customized to your company’s unique business goals and your access to resources. Our suggested framework for evaluating test ideas breaks them down into two key components: impact and effort. By analyzing experiments by impact and effort, you methodically weigh the potential return on investment (ROI) of each test and campaign. ... Ultimately, the criteria you use to prioritize your ideas will depend on your particular program’s goals and resources. If your team is technically savvy but low on design resources, you might set up tests easily but have trouble getting mockups.

5 Tips to Get Stakeholders to Like—Even Love—Your Product Roadmap

Evidence is far more compelling than your opinion. Your stakeholders are less interested to hear about what you think than about what you’ve proven. So one of the first steps in making sure all of your teams, including executives, are in agreement with your product strategy is to bring them evidence of why the strategy makes sense. That could be a video of your customers discussing or using your product, user analytics, direct customer quotes or requests, etc.—but it needs to be evidence, not speculation. It also needs to align with your product vision and goals. ... You can quantify many of the ways your product helps your customers—more money your customers can make, time it can save them each day or month or year, etc.

Why SaaS Is the Key to Maintaining a Bimodal Approach to IT

"Bimodal IT is not two-speed," he said. "It's about Samurais and ninjas. You don't want an army of ninjas because it would be too chaotic, and you don't want your innovation done by Samurais because it would be too boring. "The end game is to recognize who your Samurais are and who are your ninjas and have them working together." ... Despite its homonymity, SaaS isn’t about snappy fingers and fierce attitudes. It stands for ‘Software as a Service,’ and as Gartner defines it, is “software that is owned, delivered and managed remotely by one or more providers. “The provider delivers software based on one set of common code and data definitions that is consumed in a one-to-many model by all contracted customers at any time on a pay-for-use basis or as a subscription based on use metrics.”

Here’s What Developers Are Doing with Google’s AI Brain

Most recently, the Google Brain helped develop Smart Reply, a system that automatically recommends a quick response to messages in Gmail after it scans the text of an incoming message. The neural network technique used to develop Smart Reply was presented by Google researchers at the NIPS conference last year. Dean expects deep learning and machine learning to have a similar impact on many other companies. “There is a vast array of ways in which machine learning is influencing lots of different products and industries,” he said. For example, the technique is being tested in many industries that try to make predictions from large amounts of data, ranging from retail to insurance.

How to Monetize Your Customer Data

Companies need to start treating information as a corporate asset that generates tangible future benefits by applying infonomics principles. A term coined by Gartner, infonomics is an emerging theory and practice focused on quantifying information’s value and defining how to manage information as an enterprise asset. Although there’s increasing innovation, issues emerge in the areas of data ownership and data privacy. Regulations are fragmented across different industries and geographic regions and often fall behind technology changes. The public perception and threat of bad press from privacy breaches will most likely have more impact on companies than regulations.

Data Centers on the Edge: Streaming and IoT Reshape the Network

The demand for edge-centric content distribution represents a disruption to the geography of the data center business, which has historically been focused on major business markets, home to lots of customers, network exchanges and established business models. That’s all beginning to change, according to Compass’ Crosby, who says the data center industry must also rethink some of its common assumptions. “I think that in the very near future, the location of customers and the latency needs of the applications they need to support will determine where they want their data center(s) to be located,” said Crosby.

Secure Authentication for Public Wi-Fi

Public Wi-Fi networks, by their very nature, are a hotbed for silent cyber attacks, as a business's sophisticated security systems won't have any affect on them to protect users. Some may even say that breaching them is child's play, following reports of a seven-year-old successfully attacking one in less than 11 minutes.[2] Hotspots are more often than not left unencrypted, so information is openly presented, and without warning can be collected by hackers. By simply entering an email address - and some hotspots don't even ask for any user information to log on - millions of people can access the same networks. This giveaway of such a personal piece of information to a network that is so easy to access is terrifying and users need to consider where their data is being collected before handing it over.

Quote for the day:

"When data disproves a theory, a good scientist discards the theory and a poor one discards the data." -- Will Spencer

No comments:

Post a Comment