Facial recognition technology: force for good or privacy threat?

Credit to Author: Christopher Boyd| Date: Mon, 12 Aug 2019 15:00:00 +0000

It seems facial recognition technology, as technology so often does, has raced far ahead of our ability to define its ethical use. We take a hard look at major concerns brewing in cities around the world.

Categories:

Tags:

(Read more…)

The post Facial recognition technology: force for good or privacy threat? appeared first on Malwarebytes Labs.

Read more

As the Automotive Industry Embraces e-Mobility Services and Connected Vehicles, IT Infrastructure Has to Adjust

Credit to Author: Reiner Manger| Date: Thu, 08 Aug 2019 14:18:52 +0000

According to McKinsey & Company, nearly 100 million lines of software code are needed to control and operate the subsystems that make up a modern automobile. By 2030 that software… Read more »

The post As the Automotive Industry Embraces e-Mobility Services and Connected Vehicles, IT Infrastructure Has to Adjust appeared first on Schneider Electric Blog.

Read more

8 ways to improve security on smart home devices

Credit to Author: Kayla Matthews| Date: Wed, 07 Aug 2019 15:00:00 +0000

Smart home devices aren’t the most secure, but they do make life more convenient. How can those who’ve embraced smart home tech stay as secure as possible? Here are eight ways.

Categories:

Tags:

(Read more…)

The post 8 ways to improve security on smart home devices appeared first on Malwarebytes Labs.

Read more

China Unicom: Zero operational interruptions through 24/7 services support

Credit to Author: Roger Casellas| Date: Tue, 30 Jul 2019 14:52:29 +0000

China has been at the forefront of many different industry technologies, such as artificial intelligence (AI), the internet of things (IoT), virtual reality (VR), and they are now advancing with… Read more »

The post China Unicom: Zero operational interruptions through 24/7 services support appeared first on Schneider Electric Blog.

Read more

Modernizing Emergency Shutdown Systems Step 4: Use a Risk Approach

Credit to Author: Steve Elliott| Date: Mon, 22 Jul 2019 13:00:23 +0000

The Digital Revolution. Industry 4.0. The Industrial Internet of Things. The 4th Industrial Revolution. Call it what you will but today’s fast-accelerating technological evolution has forever changed the business of… Read more »

The post Modernizing Emergency Shutdown Systems Step 4: Use a Risk Approach appeared first on Schneider Electric Blog.

Read more

How Will Companies Deploy Industrial IoT Security Solutions?

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Thu, 18 Jul 2019 14:05:42 +0000

Industrial IoT (IIoT) devices will comprise the majority of the billions of IoT devices deployed over the next decade. How will the information security market meet this onslaught of technology? The consumer market is not a useful guide for this analysis. Consumers buy in small quantities and choose to deploy information security tools piecemeal. Few…

The post How Will Companies Deploy Industrial IoT Security Solutions? appeared first on .

Read more

The industrial Edge will bring flexibility and optimization to manufacturers

Credit to Author: Vincenzo Salmeri| Date: Wed, 17 Jul 2019 15:00:00 +0000

This was originally published by DCD. Similar to the previous three industrial revolutions which capitalized on steam power, assembly lines, and computers, respectively, Industry 4.0, or the fourth industrial revolution… Read more »

The post The industrial Edge will bring flexibility and optimization to manufacturers appeared first on Schneider Electric Blog.

Read more