” EVA was developed from cheap reliable parts. It uses the same motors that power the electric windows in cars, while the computer chips are similar to those used in the consumer electronics business. This is allowing them to sell EVA at £8,000. ” The developers talk about their ” the intention to democratise robotics, to make automation accessible and affordable to as many people as needed it.” How does an $8,000 robot that can place stickers on packages “democratize” anything?
Since the dawn of man using tools to accomplish tasks, each new tool has (usually) led to some form of democratization. What does it mean to “democratise robotics”?
Why is, that even after reading that Amazon has collected “transcriptions of all 31,082 interactions my family has had with the virtual assistant Alexa. Audio clips of the recordings are also provided”, that almost no one will change their behavior despite concerns about their own privacy?
Is it right that Amazon can collect this level of data from what you do at Amazon.com?
After Microsoft announced a cloud data breach that resulted in the accidental exposure of 250 million customer support records last week, cloud misconfiguration issues once again burst into the cybersecurity spotlight. On the bright side, Microsoft launched a model response, illustrating how a quick and effective reaction can preserve the public’s trust and prevent a media disaster following a cloud data breach announcement.
” Although Microsoft has features that can help identify and protect against misconfiguration errors, they were reportedly “not enabled for this database.” This gets to the crux of many cloud data breaches: while cloud providers do offer many security features, they are often not enabled by default. ” What can we learn from this?
” Audit your cloud configuration – Routine cloud configuration reviews are now an essential part of a strong security program.” What new career opportunities are available from this advice?
Michelle Keith was distressed last April when her basset hound puppy ate some of the big chocolate Easter eggs she had laying on the top of a cupboard.
Knowing that chocolate can be toxic for dogs, she knew she had to do something.
But she was reluctant to rush Dinah into an emergency clinic at a local vet and pick up a hefty fee for the visit.
Instead, she called, via a video chat service, a vet available through Pawsquad, a UK based start-up.
“I got advice that the amount of chocolate she had eaten wouldn’t be toxic, based on her weight,” says Ms Keith, who lives in Greenock, 40 minutes west of Glasgow. “I also learned about the symptoms to look out for if my dog took a turn for the worse.”
Federal departments or agencies have mishandled personal information belonging to 144,000 Canadians over the past two years, according to new figures tabled in the House of Commons — and not everyone who was swept up in a privacy breach was told about it.
The new figures were included in the federal government’s answer to an order paper question filed by Conservative MP Dean Allison late last month. The nearly 800-page response didn’t offer an explanation for the errors, which range in seriousness from minor hiccups to serious breaches involving sensitive personal information.
” In one of those cases, a protected hard drive containing personal information belonging to 11,780 individuals was inadvertently made accessible to some CRA employees in January 2019. “ How do you stop (or control for) a “protected hard drive” for being “inadvertently made accessible”?
” The Department of National Defence said most of its 170 breaches, which affected more than 2,000 people, were due to inappropriate access to…personal information” What steps could (and should) have been taken to make sure access was appropriate?
” As the global march toward automation continues, particularly threatening jobs in factories, retail, food service and distribution centres, a significant gap in middle-skill workers (those with more education than a secondary school diploma) has also emerged. ” Is this statement about the threat of automation correct, or not?
When Stephanie Andel can feel her eyes glaze over scrolling through academic papers, institutional emails or student marking, she’ll open a new tab in her web browser and explore. “I take a few minutes every hour or two to surf the web, look at news or scan my Facebook feed to catch up with friends,” Andel, assistant professor of psychology at Indiana University Purdue University of Indianapolis, admits.
She’s not alone. Research shows that workers drift from their contracted tasks to personal email, social networks and the far corners of the internet for anything between a few hours a week to a few hours a day. Six out of 10 people admit they can’t get through the workday without checking their social media, according to online learning firm Udemy, while two-thirds of us say Facebook is the biggest time-sink. This phenomenon – known as cyberloafing – is an issue that costs businesses $85bn a year through lost time, according to researchers at the University of Nevada.
” research shows that cyberloafing can keep employees happier and mitigate against negative effects of workplace culture ” What are your thoughts on the positive impacts of “cyberloafing”?
The article suggests that whether “cyberloafing” is positive or negative depends on ” the type of organisation, the job and work conditions “. Discuss what different types of organization, job and work conditions change whether “cyberloafing” might have a positive or negative effect.
To town councillors in Essex, Ont., it sounded like an expensive, if necessary, proposal.
At a public meeting last August, the town’s insurance provider pitched a new type of policy that he said a growing number of municipalities are buying: coverage against cyberattacks.
“By purchasing this layer of protection, you can have a little peace of mind,” Wally McNeilly, of Aon Risk Solutions, told the councillors.
Spurred by reports of criminals hijacking computer networks and demanding payment, more and more local governments and companies are purchasing specialized insurance coverage against these high-tech crimes. However, some security experts warn that insuring against attacks — and, in particular, paying ransoms — is likely to embolden hackers by increasing their confidence they can get paid.