Menu

Blog

Archive for the ‘policy’ category: Page 74

Feb 26, 2016

Unprecedented scientific report says decline of pollinators a threat to food security

Posted by in categories: food, health, policy, security

Around the world, the animals that pollinate our food crops — more than 20,000 species of bees, butterflies, bats and many others — are the subject of growing attention. An increasing number of pollinator species are thought to be in decline, threatened by a variety of mostly human pressures, and their struggles could pose significant risks for global food security and public health.

Until now, most assessments of pollinator health have been conducted on a regional basis, focusing on certain countries or parts of the world. But this week, a United Nations organization has released the first-ever global assessment of pollinators, highlighting their importance for worldwide food and nutrition, describing the threats they currently face and outlining strategies to protect them.

The report, which was released Friday by the U.N.’s Intergovernmental Science-Policy Platform on Biodiversity and Ecosystem Services (IPBES), has been in the works since the summer of 2014. The research team consisted of more than 70 experts, who drew on the most up-to-date global pollinator science, as well as local and indigenous knowledge, to complete the assessment.

Continue reading “Unprecedented scientific report says decline of pollinators a threat to food security” »

Feb 25, 2016

Need To Beef Up India’s Cyber Security Policies And Mechanisms – Analysis

Posted by in categories: cybercrime/malcode, finance, government, policy, robotics/AI

I luv it — India get’s it. You have to make sure that your IT foundation is solid first before unleashing things like AI. Connected AI requires a solid and secured infrastructure foundation 1st. In order for customers to buy into Cloud & the whole IoT, and connected AI set of products and services; the customer must feel that they can trust you fully.


By Jayadev Parida

Take a stock of the past, analyse the present cliché and frame a strategy for future. In the recent years, India’s approach to cyber security has experienced a shift from style to substance. Prime Minister Modi’s foreign policy has made various strong interventions on cyber security matters. Those interventions need to be materialised to manoeuvre the interest. Presumably, the Prime Minister Office (PMO) is likely to invest both political and capital energy to enhance a cautious cyber-strategy. A dedicated Division in the Indian Ministry of External Affairs (MEA) for cyber security is a value addition to that. In 2015, Minister of Communications and Information Technology in a written reply to the Lok Sabha stated that government allocated Rs 755 crore to combat cyber security threats over a period of five years. But, this financial outlay is quite negligible as the nature of threat is quite huge and unpredictable.

Continue reading “Need To Beef Up India’s Cyber Security Policies And Mechanisms – Analysis” »

Feb 24, 2016

The Apple-FBI Fight Isn’t About Privacy vs. Security. Don’t Be Misled — By Brian Barrett | Wired

Posted by in category: policy

Apple_Backdoor

““You hear over and over and over again, from the pro-backdoor camp, that we need to strike a balance, we need to find a compromise,” says Cardozo. “That doesn’t work. Math doesn’t work like that. Computer security doesn’t work like that … It’s kind of like climate change. There are entrenched political interests on one side of a ‘debate,’ and on the other side is the unanimous scientific and technical community.””

Read more

Feb 23, 2016

Calif.‘s Harris Outlines ‘Reasonable’Data Security

Posted by in categories: business, cybercrime/malcode, internet, law, policy, quantum physics

I wish the CA AG a lot of luck; however, her approach is very questionable when you think about downstream access and feed type scenarios. Example, Business in Boston MA has an agreement with a cloud host company in CA, and Boston also has data that it pulls in from Italy, DE, etc. plus has a service that it offers to all of users and partners in the US and Europe that is hosted in CA.

How is the CA AG going to impose a policy on Boston? It can’t; in fact the business in Boston will change providers and choose to use someone in another state that will not impact their costs and business.

BTW — I didn’t even mention the whole recent announcement from China on deploying out a fully Quantum “secured” infrastructure. If this is true; everyone is exposed and this means there is no way companies can be held accountable because US didn’t have access to the more advance Quantum infrastructure technology.

Continue reading “Calif.‘s Harris Outlines ‘Reasonable’Data Security” »

Feb 23, 2016

Homesteading in Space: White House Science Office Seeks Sci-Fi Inspiration

Posted by in categories: policy, science, space

Today at the California NanoSystems Institute/ UCLA in Los Angeles, California, the White House Office of Science and Technology Policy (OSTP) co-sponsored a look at humanity’s space future.

Read more

Feb 22, 2016

Is San Bernardino iPhone Fully Encrypted?

Posted by in categories: encryption, government, hacking, law enforcement, mobile phones, policy, privacy, security

Here is a question that keeps me up at night…

Is the San Bernardino iPhone just locked or is it properly encrypted?

Isn’t full encryption beyond the reach of forensic investigators? So we come to the real question: If critical data on the San Bernardino iPhone is properly encrypted, and if the Islamic terrorist who shot innocent Americans used a good password, then what is it that the FBI thinks that Apple can do to help crack this phone? Doesn’t good encryption thwart forensic analysis, even by the FBI and the maker of the phone?

iphone-01In the case of Syed Rizwan Farook’s iPhone, the FBI doesn’t know if the shooter used a long and sufficiently unobvious password. They plan to try a rapid-fire dictionary attack and other predictive algorithms to deduce the password. But the content of the iPhone is protected by a closely coupled hardware feature that will disable the phone and even erase memory, if it detects multiple attempts with the wrong password. The FBI wants Apple to help them defeat this hardware sentry, so that they can launch a brute force hack—trying thousands of passwords each second. Without Apple’s help, the crack detection hardware could automatically erase incriminating evidence, leaving investigators in the dark.

Continue reading “Is San Bernardino iPhone Fully Encrypted?” »

Feb 21, 2016

Global Healthspan Policy Institute Photo

Posted by in categories: health, life extension, policy

Global Healthspan Policy Institute added a new photo.

35 mins ·.

Read more

Feb 17, 2016

A Republican President Could Change Apple And Google’s Tax Picture, Expert Says

Posted by in category: policy

Many know that who ultimately lands in the US White House can impact how US Tech Companies respond as well as their investors. This article discusses some of the potential impacts resulting in a GOP President for Apple and Google https://lnkd.in/bxWft89


Equity markets tend to overreact to the potential for major political policy changes, but a new report by UBS analyst Steven Milunovich indicates that some of the biggest U.S. companies could be facing a real possibility of major tax bills if a Republican is elected president in 2016.

According to Shane Lieberman, Federal Affairs Manager in the U.S. Office of Public Policy for UBS Americas, companies with large hordes of cash overseas, such as Apple Inc. (NASDAQ: AAPL) and Alphabet Inc (NASDAQ: GOOGL) (NASDAQ: GOOG) may have a lot more riding on the election than investors realize.

Continue reading “A Republican President Could Change Apple And Google’s Tax Picture, Expert Says” »

Feb 13, 2016

Global Healthspan Policy Institute

Posted by in categories: health, policy

The world’s most prestigious thinktank dedicated to advancing the most productive and quality years of life.

Read more

Feb 5, 2016

Space and Technology Review: Our Home Among the Stars

Posted by in categories: energy, food, materials, policy, singularity, space

At Singularity University, space is one of our Global Grand Challenges (GGCs). The GGCs are defined as billion-person problems. They include, for example, water, food, and energy and serve as targets for the innovation and technologies that can make the world a better place.

You might be thinking: We have enough challenges here on Earth—why include space?

Continue reading “Space and Technology Review: Our Home Among the Stars” »

Page 74 of 93First7172737475767778Last