Singapore models entire country in 3D with smart map

Predictive analytics can give marketing campaigns a head start, but business stakeholders may need convincing

Slow response to Privacy Shield EU-US data transfer programme
Only 40 US firms has been certified under the Privacy Shield transatlantic data transfer programme, but this is expected to gain momentum

Europe lags US in gigabit broadband deployments
Network test firm Viavi inaugurates its Global Gigabit Monitor, examining the pace of gigabit broadband roll-out around the world

Sage data breach underlines insider threat
Organisations need to take insider threats more seriously say security experts, as Sage warns that a data breach using an internal log-in may have compromised employee data at nearly 300 UK firms

Mobile internet will grow GDP and generate jobs in Asean countries
Mobile internet penetration in Southeast Asia will boost the region’s gross domestic product and increase employment, a report says

Care charity Avante enhances unified communications capabilities with 3CX
Kent-based residential care charity Avante Care and Support installed an IP PBX to manage telephony across multiple sites and a mobile workforce

Government announces digital apprenticeship service as part of apprenticeship levy guidelines
The government has released guidelines for the upcoming apprenticeship levy, including how businesses can access funds to train apprentices

Newcastle and Gateshead take public Wi-Fi network to the streets
Newcastle and Gateshead councils have extended their public Wi-Fi network for a further 10 years with assistance from BT and the government

Russia competition watchdog fines Google $6.8m over Android
As Google faces a fine of around $3bn for anti-competitive practices in Europe, Russian authorities have ordered the internet giant to pay $6.8m for abusing its dominant position with Android device makers

Financial cyber attacks increase as malware writers join forces
Financial malware attacks increased 16% in the second quarter of the year, driven by collaboration between the developers of two banking Trojans in the top the financial malware threats, says Kaspersky Lab

IT business confidence in UK drops by a fifth
Brexit is set to shake-up the IT industry, given many tech firms run European head offices in the UK

Security pros split on government access to cloud data, survey shows
Despite rapid cloud services adoption, security and compliance concerns revolving around inappropriate use or access of sensitive cloud data continue to loom large, a survey has revealed

Nimble adds to all-flash arrays with entry-level AF1000
Nimble made its debut in all-flash in February 2016, but now adds an entry-level array, the AF1000, plus upgrades to its hybrid flash array products that up performance and capacity

IDC: Global public cloud spend set to double by 2020
Market watcher predicts use of public cloud will soar over the next five years, with IaaS and PaaS leading the way

Google Fiber to expand tests of gigabit-speed wireless broadband
Google Fiber plans to expand tests of wireless broadband to accelerate the roll-out of low-cost superfast internet across the US

Security Think Tank: Brexit – An opportunity for infosec pros to take the lead
What are the pros and cons of Brexit for information security professionals and data protection?

IT departments fear they lack skills to implement IoT
Adoption of IoT systems in enterprises is being held back by worries over skills, says a joint report by Capita and Cisco

Mobile devices becoming first port of call for shopper info
Shoppers are using their mobile devices to search for product and services information they normally would have sought in store, according to research by Hitwise

It’s not too late to turn the tide on Investigatory Powers Bill
The government has set David Anderson QC an almost impossible task in his review of the sweeping bulk powers proposed in the Investigatory Powers Bill – but it is not too late to make a difference

Prisons to get power to remotely pull plug on illicit mobile phones
The Home Office is to give prisons in the UKnew powers to cut off illicit use of mobile phones by inmates

Nordic CIO interview: Johan Tömmervik, SKF
Johan Tömmervik, CIO of Swedish-founded bearing and seal manufacturer SKF, tells Computer Weekly about the challenge of creating services for a diverse customer base

Choosing the right colocation provider
Quocirca’s Clive Longbottom runs through the list of items enterprise IT managers should look for in prospective colocation providers

MI5 staff repeatedly overrode data surveillance rules
Security service MI5 is responsible for 210 “clear contraventions” over five years for the way it accessed private internet and telephone data

IPT fines Police Scotland for communications breach of privacy
The case comes as the UK government prepares to introduce the Investigatory Powers Bill, which will give sweeping powers for suspicion-less surveillance of telephone, web and email communications

Microsoft hails cloud security breakthrough with encrypted data
Microsoft researchers talk up cloud security breakthrough that allows encrypted data to be processed without prior decryption

Intel to acquire AI firm Nervana Systems
Chip maker Intel is to acquire artificial intelligence firm Nervana Systems in a bid to take AI to the next level based on its Xeon and Phi processors

Facebook suppresses ad blockers to maintain revenues
The social media site now provides a new dashboard to enable users to specify what adverts they don’t want to see

UK well-equipped to protect data after Brexit, says new ICO head
The public sector, industry, civil society and the public at large all have a role to play in effective data protection regulation, says new UK information commissioner Elizabeth Denham

Rackspace divests Cloud Sites as managed cloud services take off
Rackspace offloads ‘non-core’ Cloud Sites business as speculation about its future as a public company continues

Security Think Tank: Forget Brexit, use GDPR to foster customer relationships
What are the pros and cons of Brexit for information security professionals and data protection?

PwC Australia uses gamification to teach cyber security lessons
With the number of cyber incidents identified by Australian organisations more than doubling in the last year, PwC is using an online game to give enterprises first-hand experience of what it means to face a cyber attack

Operator Alfa launches Lebanon’s first LTE-A network
LTE-Advanced network launched by operator Alfa, using technology from Nokia

Security Think Tank: Queen’s Gambit – Brexit implications for infosec pros
What are the pros and cons of Brexit for information security professionals and data protection?

Finland brings e-patient records and 5G into health tech testing
Oulu University Hospital in Finland is using replica electronic patient records to support technology testing

Retail banks ordered to open up APIs
The Competitions and Markets Authority opens up the banking apps market following an investigation into how to create greater competition in banking

Oracle Micros breach highlights PoS and supply chain security risks
Oracle Micros breach shows supply chain and point of sale systems continue to be popular avenues of attack for cyber criminals

Met Office moves weather observation site to Azure
The Met Office’s Weather Observation Website (WOW) used to run on Google’s cloud, but has switched to Microsoft’s Azure cloud platform

Vodafone to end broadband landline rental charges
Vodafone becomes the first UK internet service provider to remove line rental charges for new and upgrading fibre-based broadband customers

Global infosec spending to reach £63bn in 2016, says Gartner
Athough security spending is moving to detection and response, Gartner expects preventive security to continue strong growth

E8 launches D24 NVMe PCIe SSD-based all-flash arrays
Startup E8 aims at high-end use cases with arrays built from commodity NVMe PCIe flash drives and performance figures that rival EMC’s high-end DSSD D5 rackscale flash

Half of vehicle cyber vulnerabilities could give hackers control, study shows
Half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle and 71% are easy to exploit, according to a three-year study by IOActive

Gen-Z visit stores to ‘validate’ product purchases

Be the first to comment on "Singapore models entire country in 3D with smart map"

Leave a comment

Your email address will not be published.


*


Time limit is exhausted. Please reload the CAPTCHA.