Robo-wings: Military drones that mimic hawks and insects

Posted by & filed under AI/Artificial Intelligence, Electronic Surveillance, IT Trends, Robotics.

A Defense agency is working on a surveillance robotic hawk that could fly through an urban combat jungle at 45mph The study is looking at developing new algorithms to allow a small UAV to operate without a remote pilot. Source: CNN Tech Date: January 31, 2015 Link (to paste into browser): 1) How could… Read more »

Webscape: A toolkit for start-ups

Posted by & filed under E-Business, E-Commerce, Social Computing, Social Media, Social Networks.

From sites which offer tips from successful entrepreneurs and business people to a daily email of key news events, this video rounds up some of the best tools for those starting a business. Source: BBC News Date: January 30, 2015 Link (to be pasted into browser): Discussion 1) Why do you think these entrepreneurs… Read more »

Starbucks is morphing into a tech company

Posted by & filed under IT Strategy, IT Trends, Payment Technology.

It’s official. Starbucks wants you to think of it as a technology company, not a coffee retailer. Starbucks is serious about becoming a mobile payment giant that can compete with the likes of Apple (AAPL, Tech30), PayPal, Google (GOOGL, Tech30) and former Starbucks partner Square. During a conference call with analysts Thursday, January 22nd, 2015,… Read more »

Microsoft HoloLens – Transform your world with holograms

Posted by & filed under Augmented Reality, Emerging Technologies, Virtual Reality Training.

The latest technology from Microsoft claims to be one that will transform how you work and play. Source: Microsoft Date: January 22, 2015 Link: Discussion 1) As you watch this video, think of how you might use it to do something revolutionary. How does the IT help this happen? 2) You will notice that… Read more »

Hacking cars and traffic lights at Def Con

Posted by & filed under Civil Liberties, Cyber Security, IT Security, IT Trends, Privacy.

One of the biggest hacking conferences in the world is Def Con (defense readiness condition (DEFCON) is an alert state used by the United States Armed Forces). Cybersecurity talks at Def Con included hacking cars, traffic lights and social engineering – where actors tried to get real companies to reveal compromising information. Source: BBC News… Read more »

Intel’s CEO talks wearable technology, the PC, and what’s in store for the future.

Posted by & filed under Emerging Technologies, IT Trends, Wearable Technology.

Intel’s CEO is at CES (Consumer Electronics Show) talking about the future and how Intel will play a role. Source: CNN Date: January 16th, 2015 Link (to paste into browser): Discussion 1) Intel’s CEO is one of the most influential people in the world when it comes to the future of tech. Do you… Read more »

The Top Technology Failures of 2014

Posted by & filed under Uncategorized.

All successful technologies are alike, but every failed technology flops in its own way. Success means a technology solves a problem, whether it’s installed on a billion smartphones or used by a few scientists carrying out specialized work. But many—maybe most—technologies do not succeed, typically because they fail to reach the scale of adoption that… Read more »

“Super cookies” track you, even in privacy mode

Posted by & filed under Business Analytics, Civil Liberties, Electronic Surveillance, IT Security.

Ironically, a trusty online privacy feature can now be reworked into a “super cookie” that tracks you like a bloodhound. Any respectable Web browser has a “privacy mode,” a clean slate without the tiny bits of information (cookies) that identify you to websites. Google Chrome has “incognito.” Mozilla’s Firefox has “private window.” But there’s a… Read more »