Siliconexion is the premier product design outsource partner to Electronic OEMs in the Southeast. We offer complete turnkey product development services ranging from concept specification through prototype fabrication. Our depth and breadth of product design expertise can tackle complete systems or small sub-systems. We also feature specialization in advanced integrated circuit and FPGA design.
Google's Pixel family of devices hasn't sold very many units compared with Apple or Samsung, but Google is reportedly charging ahead with plans for a Pixel 3.
from ComputerWeekly.com https://www.computerweekly.com/news/252442204/Artificial-intelligence-identifies-skin-cancer-in-lab-test-more-effectively-than-doctors
Intel has unveiled a new tier of Optane storage -- one designed to bridge the gap between volatile and non-volatile memory and create a new class of "Persistent" memory in the process.
We're enthralled by the idea of cars that can whisk us anywhere without us lifting a finger, but in the meantime some of the early efforts are making what seems like a rookie mistake and plowing into parked vehicles. We look at why.
from ComputerWeekly.com https://www.computerweekly.com/ehandbook/New-tech-on-the-block-Planning-for-blockchain-in-the-retail-and-consumer-packaged-goods-industries
from ComputerWeekly.com https://www.computerweekly.com/news/252442112/Ontario-Institute-for-Cancer-Research-uses-open-source-clouds-to-aid-cancer-research
It is not uncommon that you might need to reboot your router because of some error or bug, but it's not often that you need to reboot it in the name of national security.
New tech and new laws are combining to make hearing augmentation easier to get, as well as more affordable. We tested the Nuheara IQBuds Boost, one of the first examples of this new class of hybrid listening and hearing devices called hearables, on an extended road trip to Africa and back.
The Cretaceous-Paleogene extinction event didn't just kick off a short-term apocalyptic winter -- it may have turned the planet's thermostat up dramatically for a hundred thousand years.
from ComputerWeekly.com https://www.computerweekly.com/news/252442009/Save-the-Children-International-uses-Microsoft-Azure-to-bolster-cross-border-charity-work
Anyone still smarting over Pluto's demotion to dwarf planet has a reason to perk up. There's some evidence that the planetoid didn't form through the standard process and may instead be the remains of up to a billion comets, smashed together.
Now more compelling as a compact SUV, the 2018 Chevy Equinox can go 600 highway miles between fill-ups on diesel. Key safety features are reserved for the Premium version, but no there's still adaptive cruise control.
Each year phone manufacturers push smartphone camera limits further. We took a couple of the best phones on a wildlife safari in Africa to see how well they'd make out handling such a tough photographic challenge.
from ComputerWeekly.com https://www.computerweekly.com/news/252441909/Former-Macedonian-PM-convicted-in-corruption-case-exposed-by-illegal-government-surveillance
from ComputerWeekly.com https://www.computerweekly.com/news/252441906/Canonical-founder-calls-out-OpenStack-suppliers-for-lack-of-focus-on-datacentre-cost-savings
from ComputerWeekly.com https://www.computerweekly.com/news/252441849/Computing-curriculum-shake-up-cant-happen-in-a-single-five-year-parliamentary-term-says-panel
There are 13 and 15-inch variants, and each is available as a regular laptop and a "Spin" version with a 360-degree hinge. These might be just what the premium midrange needs.
Is your current laptop a bit long in the tooth? Now's the perfect time to upgrade! For a limited time, you can pick up a refurbished 12.5-inch hybrid Dell Latitude 12 5289 laptop from the PCMag shop with a $500+ discount with today's coupon in play.
Just because you've got an older or low-end PC doesn't mean you can't enjoy gaming. There are thousands of back titles in the PC catalog. Here are some of our favorites.
The Massive Timing Hodoscope for Ultra Stable Neutral Particles (which goes by the inaccurate but much simpler nickname MATHUSLA) will look for particles the LHC misses because they're too stable.
Elon Musk is promising a firmware update to fix brake issues with the Model 3, surprising those of us who didn't know brakes were controlled by firmware.
According to sources who spoke to Politico, Trump uses at least two iPhone devices provided by the White House IT staff. However, they are not swapped regularly like in the Obama era.
While Google Glass utterly failed as a consumer device, its second life as an industrial tool makes sense. And eventually, full-bore augmented reality will be small and cheap enough to be implemented in glasses that don't look different from what's commonplace now.
The attack likely infected around 100 targets, which isn't a huge number compared with most malware campaigns. However, these were all highly targeted infiltrations to gather intelligence on political opponents.
from ComputerWeekly.com https://www.computerweekly.com/news/252441602/Canonical-founder-Mark-Shuttleworth-takes-aim-at-VMware-and-Red-Hat-at-OpenStack-Summit
A well-put-together GDPR checklist is a pure gold because it offers you an umbrella against the fines announced.
Although complying with GDPR does seem like a lot of work, organizing and structuring that workload, can considerably ease things up.
A Checklist is the first step in your journey to comply with the new set of regulations. After all, you need to start somewhere.
Can I have your consent?
The cornerstone of the GDPR is consent. You needed consent before GDPR, but it was so much simpler to obtain it. Now, in the context of the new regulations, obtaining consent is no longer a sure thing. GDPR clearly states that unless legitimate interest is involved, getting clients to say yes needs to be done in an explicit manner, using plain language, clearing up the reasons for which consent is requested. The user needs to know exactly what his/her personal data is going to be used for and by whom.
Having legitimate interest is not equal to having consent, as the data gained cannot be used for other purposes than those implied.
Once consent is heroically obtained you need to record and safeguard it, is also prepared to hand it over when requested as such. So far, so good, but in terms of complying with GDPR what does it mean exactly?
Well, in plain talk, you’ll need to pump some money or time into developing a new consent request design, forgetting all about those pre-ticked boxes, providing users with extensive info on your actions, updating your terms and conditions and no more hiding them in the fine print. Agreed?
Speak up
With this newly improved data protection law, the data subject, meaning any identifiable person, has gained quite a few interesting rights, hence DSR, which is really short for Data Subject Rights. They are all straightforward and comprehensible, but somehow, during the last decade, we never actually gave them any real thought.
If we did, we would most certainly enter panic mode and feel the express need to come up with alternative marketing strategies. However, these rights are the ones that will completely shift you from being a rebel business to a GDPR compliant one. So, let’s take them one at a time and see what to do next.
Power to the people
You need to store and organize all the info you have about your clients. Simply giving them an email with numbers and letters doodled inside won’t do. You have to provide clients with structured, easy to comprehend information, in a common format.
In terms of complying, you can imagine that this implies various investments in new tools that would either provide the users with easy access or that would structure the information you have on them and streamline the process, optimizing it as best as possible.
Forgotten and forgiven
Without going into philosophical discussions on the human condition, individuals do have this right and you are obligated to provide them with the framework. If you should receive an erasure request, you need to put it into practice. The tricky part here is the deadline, as it is mentioned that the data controller needs to act “without undue delay”. In plain language, this means fast, but in legal talk, things are a bit fuzzy. One can only assume that the idea is indeed to act fast.
Now, thinking of implementation, it is vital to understand that when the individual asks to be forgotten, you need to erase all the existing data you have on him and this includes copies, stored on the cloud or collected by third parties.
So, you’ll be required to have systems that quickly identify data, the locations in which it is stored and ensure a fast erasure.
Stand corrected
Starting with the 25th of May, all users can ask to have their information corrected.
You have to figure out a way in which they can do this. Once again, complying with GDPR means investing in tools.
Making the big announcement
This implies that you are obligated to send all the data you have on an individual to a different organization, in a commonly used, structured format, should you be asked to do so by the data subject.
As expected, this would, of course, require that you put together a robust system, through which portability can be easily done.
Time to move
This implies that you are obligated to send all the data you have on an individual to a different organization, in a commonly used, structured format, should you be asked to do so by the data subject. As expected, this would, of course, require that you put together a robust system, through which portability can be easily done.
Time to object
Even though you have obtained consent, the user could change his/her mind and decide against you, objecting to the fact that you are processing personal data. In this situation, you have no other alternative but to comply and stop personal data handling.
Data Breach Ready
So, you’ve noticed a breach in the system. It’s time to ask yourself: What would GDPR expect me to do?
If this day comes, as soon as you notice the breach you need to identify the threat. Start acting as if you were under attack.
First, you take the threat under consideration. If the data breach is believed to be a threat to users, the data controller needs to announce the GDPR Supervisory Authority within 72 hours of the breach identification. Afterward, the users need to be informed as well.
Building up your defenses
You are granted permission. Your customer said I Do to the consent question. Don’t get your hopes up, even though these days asking for consent really seems more difficult than anything else. Now, you have to secure all that personal data. Make sure that the user’s personal data is well taken care of, safeguarding it through various means such as encryption or anonymization. You are going to use personal data, relax! You are just going to have to do it differently. The best way to use personal data without putting security at risk is through Pseudonymization. Data is still safely guarded, but you can analyze them, making this method the ultimate combination.
You mustn’t mud things up here, as anonymization and pseudonymization are two completely different concepts. GDPR brought them together, under the security umbrella for a very good reason.
While anonymization completely destroys any chance of identifying the user, pseudonymization, this Zodiac killer of the IT world, substitutes the identity of the data subject with additional information, creating a coded language. Data is still protected but can be used for research purposes.
Let’s wrap this up!
GDPR comes with a lot of changes. Asking for consent is a must, just like storing and safeguarding the data received. The user has the power and no matter how much you would try, there is no getting it back. It’s all about conforming to the new order.
Dig up new marketing strategies, start investing in tools to improve your already existing systems, organize the data you already have to further optimize and streamline your future processing. Times of great stress lay ahead, but with a strong plan, an organized mind, this checklist and a team of hardworking IT wizards, GDPR compliance is as good as done
from siliconexion http://www.siliconexion.com/the-compliance-processes-involved-in-gdpr/
When Treyarch decided to remove COD Black Ops 4's campaign in favor of a Battle Royale mode, were they thumbing their noses at gamers -- or just giving them what they really want?
At current levels, de Vries estimates Bitcoin mining uses at least 2.6GW of power per year, and that number could grow to as much as 7.7GW by the end of the year.
from ComputerWeekly.com https://www.computerweekly.com/news/252441399/IR35-reforms-Government-invites-feedback-on-plans-to-extend-tax-avoidance-rules-to-private-sector
Instead of simply focusing on x86 cores, or even developing a line of specialized many-core accelerators like Xeon Phi, the company has said it would bring a Xeon CPU to market with an FPGA integrated directly into the die.