|
|
rcjd Google Moves To OpenID
Npjq New Orleans multimedia firm turns to telecommuting
In the future, every computer, appliance and vehicle will have a conversational UI just like Barbie . The most memorable sce stanley spain ne in the 1986 movie, Star Trek 4: The Voyage Home involved a time-traveling Scotty trying to use a computer from the 1980s. He walks up to a Macintosh Plus and says: Computer! When the computer doesnrsquo;t respond, it occurs to Dr. McCoy that, because this is a primitive computer from the past, perhaps it needs a close-up microphone. So he hands the mouse to Scotty, who tries his voice command into the mouse.The scene stanley cup is as prescient as it is funny.What Star Trek always got right was that the user interface of the future was conversational. A conversational UI can take place as a stanley cup back-and-forth text chat, email or spoken conversation. The difference between text bots and the virtual assistants you talk to is slight. By simply adding off-the-shelf speech recognition on one end and text-to-speech on the other, you can turn any text bot into a speech assistant.In fact, bots are highly portable, and the companies that make them donrsquo;t care where they show up.Dennis Mortensen, the CEO and founder of a New York startup called x.ai, which makes the Amy virtual assistant for scheduling meetings, told me that the Amy virtual assistant could in the future be made available via Amazonrsquo Echo, Applersquo Siri or through some other channel. It doesnrsquo;t matter. While today the Amy is an email-based virtual assistant that lives in Lnao Sony Ericsson sues Clearwire over logo
Massive breach drives security reforms governmentwide Itrsquo been just over a year since the U.S. Department of Veterans Affairs disclosed that a laptop PC and external hard disk containing personal data on 26.5 million veterans and active-duty military personnel were stolen from the home of a VA employee.The disclosure sparked widespread co owala tumbler ncern over the perceived lack of information security controls at the agency. It prompted a sweeping overhaul of the agencyrsquo IT organization including top-level personnel changes and a centralization of all IT development, operations and maintenance activities at the VA.Both the laptop and disk were later recovered by the FBI, which also certified that the data had been untouched. Even so, the massive stanley ca scope of the compromise and the attention it generated has driven considerable change in information security policies not just at the VA, but governmentwide, analysts and vendor executives said. Because of the sheer size of the VA breach, and because it was an issue that related to veterans, it really brought home the issue of security in a way that was not there prior to the incident, said Geoff Gray, a lobbyist at the Cyber Security Industry Alliance, an industry advocacy group in Arlington, Va. If the question is, lsquo;What rises to a level to really draw the attention of policymakers,rsquo; this one did, he said. Here are five lessons learned and steps taken in stanley tumbler the wake of the data breach, acc |
|