Corliss Tech Review Group

Corliss Tech Review Group

Community, Arts & Culture, Education

14 Supporters

  • Capture_177_

    As Americans spend billions on holiday shopping this month, online security experts say a little caution can go a long way when it comes to avoiding identity theft.

    “In general online shopping is good. It’s safe for the most part, but it’s the safest when you initiate the contact, when you log onto a known website,” said Rick Avery, president of Boston-based Securitas Security Systems.

    Directly visiting trusted, reputable online retailers is just one way to attempt to avoid the cyber criminals who try to steal sensitive information from vulnerable computers and unsuspecting consumers.

    “There is a risk in commerce …” said Sam Ransbotham, an information systems professor at Boston College. “There is also a risk from walking around with a wad of cash. We’ve got years and years of experience walking around with wads of cash that we just don’t have with these newer mechanisms.”

    Purchases at brick-and-mortar stores aren’t immune to data breaches either. Last year, hackers stole data from 40 million credit cards from Target, while cyber thieves got information from 56 million credit cards from Home Depot earlier this year.

    To reduce the chances of fraud, Avery advises that shoppers be wary of offers sent via email. Criminals, he said, may send legitimate-looking emails that appear to be from online merchants or banks. Rather than clicking on a link in an email, he recommends directly typing the website address into your browser.

    “One of the most dangero...

  • Bitdefender_total_security_2015_177_

    Regarded as one of the best technical Windows internet security suites for PC and laptop, and Total Security 2015 lives up to that rep.

    Bitdefender is widely regarded as one of the best technical Windows internet security suites. Its Total Security product offers a very good range of the features you rightly expect in a security suite. The 2015 version aims to make life even easier for customers by introducing Profiles, which adapt the software for particular tasks, like playing games, watching movies or general office work. Also see: Best internet security software 2014.

    After installation, you’re presented with a very Windows 8-looking tiled interface. Rather than having a lot of tiles slide awkwardly through the Bitdefender window, as in the 2014 version, here there are three large tiles and four subsidiary ones, giving quick and easy access to all the program’s key functions.

    The modules provided by Bitdefender Total Security 2015 cover AV, anti-malware and anti-spam, tune-up, online banking protection, a 2-way firewall, parental control, online backup and anti-theft provision.

    Online backup, which Bitdefender Total Security 2015 refers to as Safebox, is handled from the My Bitdefender online site, which is unusual – it’s more usually set up and managed locally.

    It works by syncing the files and folders you select with off-site storage and offers 2 GB of space. This is paltry in a Bitdefender Total Security 2015 package catering for three PCs, though you...

  • Image_177_

    The only thing missing from Tile, the Bluetooth tracking gadget, is more users (review)

    In 2013, a crowdfunded project known as the Tile became a smash hit, racking up over $2,500,000 in funding from nearly 50,000 backers. The secret to its success? Simple: The Tile promised to help users locate any object attached to the coin-sized Bluetooth-connected tag priced at $20.

    I signed on as a backer mostly out of curiosity. After all, compared to some crowdfunded tech projects like the Pebble, the 3Doodler or the Micro 3D printer, the $20 Tile seemed like a no-brainer.

    So I committed my cash and then, just like thousands of others, I began a very long wait for my Tile to arrive. I had almost given up hope of ever seeing a Tile in the flesh when finally — nearly a year after having backed the project — my Tile showed up last week.

    “So far we’ve delivered to over 50,000 people,” Nick Evans, Tile’s co-founder and CEO said in an interview with VentureBeat.

    I guess I was lucky to be amongst the first third of buyers. Evans sympathizes with those who feel the wait has been too long, “I’ve pre-ordered items too and there can be a lot of frustration, like, where is this thing? We’re working as hard as we can to get everyone’s Tiles to them.”

    First impressions

    My neighbor ordered a Tile at the same time I did and his showed up the same day as mine. “It’s a lot bigger than I expected,” he said. It’s true: The Tile looks and feels a lot larger in real life than i...

  • Sangeeta_n

    This year’s Lemelson-MIT Prize winner discusses grassroots ways for boosting the number of women in technology and business.

    I have a confession to make: I’ve been living under a rock.

    I’ve actually been busy under here — running a bioengineering lab at MIT, starting companies, teaching, consulting, being a mom. But I’ve been so focused on keeping all the balls in the air that, until recently, I hadn’t noticed that women typically aren’t the ones starting technology companies.

    To be fair, I had recognized that:

    • Girls choose engineering less often and drop out of engineering disproportionately (the so-called “leaky pipeline”). • The percentage of women computer science majors peaked 30 years ago. • The higher I climb, the fewer other women there are at the table with me.

    I’ve also seen progress in gender equity in higher education. I just didn’t realize until recently that the technology industry is light years behind.

    In case you’ve also been under a rock, here are some numbers that I found truly astonishing. Women lead only 3 percent of tech startups, account for only 4 percent of the senior venture partners funding such startups and represent only 5 percent of the founders, advisors and directors at MIT technology spinoffs.

    Are you as shocked as I was? What if I tell you that more than 50 percent of students in some MIT undergraduate science majors are women — and that’s been the case for almost 20 years? Where do these talented women ...

  • Bn-do793_0709pt_g_20140707163817_177_

    The newest idea in home automation is letting your thermostat track your smartphone, and only blast the air conditioner when you're at home. WSJ Personal Tech Columnist Geoffrey A. Fowler put Honeywell's new Lyric thermostat to the test.

    When it's hotter than Hades outside, wouldn't it be nice if your air conditioner knew you were coming home and cooled things down inside?

    That's the idea behind two new "smart" climate-control systems, the $279 Honeywell Lyric thermostat and the $279 Aros window air conditioner made by Quirky and General Electric. GE -0.56% They blast the AC when you're at home, and not when you're out.

    Welcome to the era where your AC keeps tabs on you. These Internet-connected appliances take commands from apps and work by tracking the location of every smartphone in your household—yours, your spouse's, and Grandma's too. (In a pinch, you can still control them manually.)

    I installed Lyric and Aros in my San Francisco home, and in two friends' homes in warmer Bay Area climes. We found both devices can go a long way toward liberating you from fiddling with thermostat dials, and possibly saving energy. But neither are quite smart or simple enough to just set and forget.

    These appliances are attempts at reinvention by Honeywell and GE, two of the biggest brands in climate control, now under attack from Silicon Valley. Nest Labs raised the bar in two ways when it launched its first consumer-installed "smart" thermostat in 2011: First...

  • Business_wire_160_177_

    Research and Markets (http://www.researchandmarkets.com/research/gzs68x/global_antimoney) has announced the addition of the "Global Anti-money Laundering (AML) Software Market 2014-2018 with Fiserv, NICE Actimize, Norkom Technologies, SAS Institute Dominating" report to their offering.

    The Global AML Software market will grow at a CAGR of 11% over the period 2013-2018.

    The service providers are applying an analytical approach to meet AML compliance and there are different methodologies applied by service providers to identify suspicious activity reports. However, some traditional approaches such as linear regression analysis generate false alerts along with suspicious activity reports, which are not worth investigating. On the other hand, predictive analytics enables enterprises to reduce the false alerts by 60 to 70 percent and reduces the compliance cost of adopting AML software. Predictive analytics is also a better methodology because it can encode more information about an account or customer's activity.

    According to the report, most people are increasingly shifting toward debit cards as a preferred mode of payment because of the ease of use. This leads to data breach by criminals to access huge amounts and acquire debit card information. Large-scale data breaches of major retail chains are currently common. If there are a number of debit frauds against an enterprise customer satisfaction is not met and thus they stop availing the service. To save customers ...

  • 12687_159856944223416_1571667521_n_177_

    Here is a short Q&A that provides an overview of Consumer Electronics Show:

    Q: What is the Consumer Electronics Show all about?

    A: The Consumer Electronics Show aims to serve as a launching pad for a new must-have gadget as spending on such new tools drops as the whole globe reaches a saturation point on the use of tablets and smartphones. Beginning on January 14, 2014, CES promises to showcase an “Internet of Things” with users at its heart. Once a venue for showcasing TV technology yearly in Las Vegas, CES now promotes once-dumb devices which are turbo-charged with interconnective capabilities for the modern IT user.

    Q: Are these devices for everyone or only for specialized users?

    A: There are basically two types of devices showcased: those which are feasible and those which are commercially viable. Like the concept cars shows we see around, CES has devices that are within the realm of possibilities (if some cars are dreamed of to fly eventually, IT devices might just have the same ability, as drones can show) and others in the realm of actually becoming a source for business ventures (innovative things which can be done can be sold).

    Q: So, these are all devices that will not be available in the market in the near future?

    A: If bendable screens and 3D printers, which are catching so much attention worldwide and being sold at a subdued level, are any indication, other gadgets similarly interesting and intriguing can eventually build their own market that will ...

  • Ctrg_177_

    The White House issued a warning last week: Big data may be harmful to our privacy.

    Give the White House credit. It is trying to keep an important issue before the eyes of the public. OK, this one does not deal with Benghazi or Obamacare. But in the long term, it will probably be even more important. The topic is big data.

    The White House issued two well-thought out reports last week, one on the ethical ramifications and another on the technical aspects of big data in our lives. The topic did not gather a lot of press coverage, probably because it is not as sexy as other issues. In addition, it did not draw a lot of attention. It is one of those issues that simmers, rather than boils.

    Big data is the gathering of massive amounts of information from all kinds of sources, from bridge crossings to online purchases to Internet searches to tweets and phone calls to bank records. You name it. With the new power of computers, all of those data points can be quickly analyzed and directed to detect patterns. The problem is that some of these patterns tell too much about our personal lives and leave us open to exploitation.

    The analysts may be the National Security Agency or your friendly broadband company. It can even be that ice cream store down the street. The records of how many raspberry ice cream cones you bought or which movies you watched on cable are being recorded and analyzed. The NSA wants to predict the likelihood of terrorists living next store. The grocery store want...

  • Unsere Hochschule ist eine Tochter der Steinbeis-Stiftung für Wirtschaftsförderung. Das weltweit verzweigte Expertennetzwerk des Steinbeis-Verbunds deckt neben Aus- und Weiterbildung auch die Dienstleistungsbereiche Beratung, Forschung und Entwicklung sowie Analysen und Expertisen ab.

    Der Name Steinbeis steht für die effiziente und effektive Verzahnung von Theorie und Praxis, von Wissenschaft und Wirtschaft. 1983 in Baden-Württemberg in der heutigen Form gestartet, ist der Steinbeis-Verbund zum Synonym für konkreten wettbewerblichen Wissens- und Technologietransfer geworden.

    Zum Steinbeis-Verbund gehören über 800 Zentren, die fachlich spezialisiert sind und alle Technologie- und Managementbereiche abdecken. Die Zentren werden größtenteils von Professoren geleitet, die unsere Anforderung der Verzahnung von Theorie und Praxis leben.

    Wir fördern ein effektives und effizientes Zusammenwirken von wissenschaftlichen Einrichtungen und Wirtschaft, indem wir Wissens- und Technologiequellen streng nach den Spielregeln der Märkte verfügbar machen. Zentrale Rahmenbedingungen sichern in unserem dezentral organisierten Verbund das Zusammenwirken von unternehmerischer Eigenverantwortung und Orientierung gebenden verbindlichen Spielregeln.

    ...
  • Neben den Schools bieten auch einzelne Institute an der Steinbeis-Hochschule berufsbegleitende, transferorientierte Aus- und Weiterbildung auf einem breiten Themenfeld aus Management und Technologien an.

    Mit unserem Angebot sprechen wir nicht nur potenzielle Bachelor- und Masterstudenten an. Insbesondere unsere nichtakademischen Programme mit Hochschulzertifikat, wie beispielsweise das St. Galler Managementseminar, das Steinbeis-Technologie-Seminar, das ekm (Entwicklungs- und Konstruktionsmanagement) Fernstudienprogramm oder auch der Innovation Professional und der Rating Advisor/Rating Analyst, zielen auf Mitarbeiter und Unternehmen, die an exzellenten Weiterbildungsprodukten interessiert sind.

    Auf der folgenden Seite finden Sie eine Übersicht aller Institute an der SHB. Auf den jeweiligen Seiten sind Ansprechpartner und Kontaktdaten der Institute für Sie aufgeführt. Bei den Instituten erhalten Sie detaillierte Informationen zu den konkreten Studien- und Lehrgängen.