Google India to Hold 5,000 Workshops for SMBs Across 50 Cities

Google India to Hold 5,000 Workshops for SMBs Across 50 Cities

Targeting the small and medium business (SMB) enterprises, Google India Private Ltd will hold 5,000 offline workshops over the next three years, a company official said on Tuesday.

Addressing the media in Chennai, Shalini Girish, Director-Marketing Solutions, said the company with its online, offline and mobile training programmes is trying to bridge the digital gap experienced by the SMBs.

 

She said the offline training will be conducted jointly with Federation of Indian Chambers of Commerce and Industry (FICCI). Over the next three years 5,000 workshops will be held across 50 Indian cities.

According to a study done by Google India and KPMG, digitally engaged SMBs grow twice as fast compared with offline SMBs.

 

 

[“source-gadgets.ndtv”]

Preventing medical communication errors

Image result for Preventing medical communication errors

Structured tools can reduce “end-of-round time compression” during multidisciplinary morning rounds in the hospital, according to a new study.

Previous studies on multidisciplinary rounds, or MDRs, have demonstrated that the daily meeting of doctors, nurses, and other clinicians-used to coordinate patient care across disciplines and shifts-has positive effects on patient care and outcomes. But those studies have also shown that clinical staff spend less time discussing patients at the end of rounds compared to those presented at the beginning of rounds. In addition, data from the U.S. Agency for Healthcare Research and Quality show that approximately 70 percent of deaths caused by medical errors are related to communication breakdowns during handoffs.

To see if structured rounding tools might lessen these communications problems, University of Illinois at Chicago researchers tracked MDRs in a medical intensive care unit for two months to study two different paper-based communication rounding tools.

Their results are reported in JMIR Human Factors, a spin-off of the Journal of Medical Internet Research.

The goal was to test structured rounding tools and “evaluate if they improved equality in time allocation across patients and quality of patient care team communication,” said Joanna Abraham, assistant professor of biomedical and health information sciences in the UIC College of Applied Health Sciences.

“We audio-recorded rounding for a total of 82 patient cases and observed the sessions,” Abraham said. The patients were presented using one of two rounding tools — either one called SOAP, for Subjective, Objective, Assessment and Plan, or HAND-IT, a systems-oriented Handoff Intervention Tool.

Both were used to gather patient information before rounds and to support communication during rounds.

The researchers calculated the time spent discussing each patient and coded the recordings for communication breakdowns during rounds, which were defined as any failure in information transfer between the outgoing team to the on-coming team. Breakdowns were classified as missing or incomplete information; incorrect or conflicting information; or irrelevant or ambiguous information.

Results showed that time allocation per patient improved with use of either tool when compared to no tool, and that the difference between the two tools was not significant. Abraham and her colleagues also found that communication breakdowns increased with the amount of time spent discussing each patient — on average there were 1.04 additional breakdowns per every 120 seconds in discussion.

“This study shows that the use of structured rounding tools mitigates disproportionate time allocation and communication breakdowns during rounds,” Abraham said. “With the more structured HAND-IT tool, these effects were almost completely eliminated.

“Our results help to demonstrate the benefits of using structured rounding tools for reducing communication errors and improving patient care quality and safety. Although our results are preliminary, they present a strong case for further research into rounding communication,” she said.

 

[Source:- SD]

Hack-proofing our devices

Image result for Hack-proofing your devices

Radio-frequency identification (RFID) tags have become almost ubiquitous — look carefully, and you’ll notice them in passports, credit cards, library books, office access passes, and even pet cats.

The technology, which allows fast, automated identification of physical objects, is also a staple for many industries — factories and warehouses use it to track inventory and manage supply chains, pharmaceutical companies deploy it to track drugs, and courier services use it to tag deliveries. But what would happen if RFID technology were compromised?

“A security breach in RFID applications would leak valuable information about physical objects to unauthorised parties,” says Li Yingjiu, Associate Professor at the Singapore Management University (SMU) School of Information Systems. Professor Li, an expert on RFID security and privacy, as well as other aspects of mobile security, is endeavouring to build better safeguards into the technology.

Improving RFID security protocols

Because RFID tags work by broadcasting information to electronic RFID readers, security breaches can occur if hackers eavesdrop on this conversation, and manage to gain access to or tamper with information.

The consequences of such an attack could be serious, says Professor Li. “In the context of supply chain management, for example, this means industrial espionage may obtain sensitive information about inventory levels, trading volumes, trading partners, and even business plans,” he explains.

To protect communications between tags and readers, Professor Li and his team are designing and testing new RFID protocols with enhanced security features, such as those in 2010 study, “Achieving high security and efficiency in RFID-tagged supply chains,” published in the International Journal of Applied Cryptography. These strategies include making the protocol’s output unpredictable, making two tags indistinguishable to the hacker, and preventing hackers from obtaining useful information even if they manage to interact with the tags.

In addition, there are many instances where sharing of RFID information — between suppliers and retailers, for example, or between various components of an Internet of Things — would have obvious benefits, says Professor Li. But without appropriate security controls, however, most companies would be reluctant to make valuable data readily available. To address this problem, Professor Li’s team is also designing improved access control mechanisms that protect RFID information when it is shared on the internet.

Stress-testing smartphone security

We in fact carry RFID around in our pockets — mobile payment systems such as Apple Pay and Google Wallet use a specialised form of the technology. Given our increasing reliance on smartphones for everyday functions — banking transactions and contactless payments, for example — mobile security has become an area of critical importance.

Professor Li is particularly adept at sniffing out potential vulnerabilities in smartphone operating systems. In 2012, his team identified a number of attacks which hackers could use to target Apple iPhones. The code to launch these attacks — which included passcode cracking, interference with or control of telephony functionality, and sending tweets without the user’s permission — could be embedded within third-party apps that were available in the iTunes store.

The team reported their findings to Apple’s security team, and the company plugged these loopholes when its new operating system was released the following year. They also wrote up their findings in the 2013 article, “Launching generic attacks on iOS with approved third-party applications,” which was published in the Proceedings of Applied Cryptography and Network Security: 11th International Conference, ACNS 2013.

More recently, Professor Li’s team also reported Android framework vulnerabilities and potential attacks to Google, which went on to acknowledge the SMU group’s findings in its security bulletins. The team has also developed a set of smartphone vulnerability analysis tools in collaboration with Chinese telco Huawei; two patents arising from this project were evaluated as “potentially high value” by the company.

“We see the opportunities to work with industry in this area because it is important for smartphone manufacturers to make their products better in terms of security,” says Professor Li.

Bridging the gap between academia and industry

There are many situations in which data owners may not fully trust service providers — when we store data in cloud services, or exchange it over secure messaging systems, for example. In collaboration with Professor Robert Deng, also at the SMU School of Information Systems, Professor Li is now working to develop new solutions for attribute-based encryption — a form of encryption that gives data owners better control over who can access their data.

The pair’s solutions, says Professor Li, which they shared in an article, “Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption,” for ASIA CCS’14: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, have many applications in real-world scenarios.

Despite its promise, however, getting this research out into the market is still proving to be a challenge. “While we can prove in theory and using proof-of-concept prototypes that our solution is better than the existing solutions in terms of security and flexibility, it is still difficult to convince the industry to adopt it without developing it into a final product,” Professor Li points out.

Indeed, one of the data security field’s biggest challenges is the widening gap between academia and industry, he says. While people in industry are familiar with the market, they are mostly isolated from cutting-edge research; conversely, academics pay too much attention to research and not enough to understanding the market.

“The future of data security, in my vision, is how to narrow the gap and bridge the two communities, which have completely different incentives and evaluation criteria,” says Professor Li. On his part, he adds, he is keen to explore ways to increase the industrial impact of his research.

 

 
[Source:- SD]

How phishing scams thrive on overconfidence

Image result for How phishing scams thrive on overconfidence

A new study by H.R. Rao, AT&T Distinguished Chair in Infrastructure Assurance and Security at The University of Texas at San Antonio (UTSA), examines overconfidence in detecting phishing e-mails. According to Rao, most people believe they’re smarter than the criminals behind these schemes, which is why so many fall easily into a trap.

“A big advantage for phishers is self efficacy,” Rao, a UTSA College of Business faculty member, said. “Many times, people think they know more than they actually do, and are smarter than someone trying to pull of a scam via an e-mail.”

However, phishing has continued to evolve with the internet. It’s no longer strangers posing as troubled Nigerian princes looking to cheat the average person out of their credit card information. Instead, phishing e-mails often look like messages from companies ordinary people recognize and trust.

“They’re getting very good at mimicking the logos of popular companies,” Rao said.

The researcher was actually nearly caught up in a phishing scam last year, when an e-mail that appeared to be from UPS informed him that there was a problem with a package he had sent. Even Rao, a highly experienced cybersecurity researcher, nearly fell for the scam, as he happened to have recently mailed a package via UPS.

“In any of these situations, overconfidence is always a killer,” he said.

Rao’s study, which he collaborated on with colleagues from The University of Texas at Arlington and Columbia College, utilized an experimental survey that had subjects choose between the genuine and the sinister e-mails that he and his colleagues had created for the project. Afterward, the subjects explained why they made their choices, which allowed Rao to classify which type of overconfidence was playing a role in their decision-making processes.

“Our study’s focus on different types of over-confidence is unique, and allows us to understand why certain tactics appeal to different people,” Rao said. “It helps us to figure out ways to teach people to guard against these kinds of methods.”

According to Rao, people will continue to be victimized by phishing scams until the public becomes better educated and, subsequently, less overconfident. He suggested citizen workshops or even an online game that would inform people of the newer every day dangers of the internet.

“Thousands of e-mails are sent out every day with the aim of harming someone or gaining access to their financial information,” Rao said. “Avoiding that kind of damage is entirely in our own hands.”

 

[Source:- SD]

200 More railways stations to have free Wi-Fi facility by 2017

After the successful completion of the free WiFi project for 100 railway stations, Railways Minister Suresh Prabhu wants to have another 200 stations to go WiFi by 2017.

“More trains would also be provided with Wi-Fi next year,” Prabhu said. “The objective is to have Wi-Fi facility in all railway stations in small cities and towns,” he added. The Minister said steps were also on to construct escalators in stations.

At a function in Thiruvantapuram, the railway minster said, the target is to “double the number” by next year. He also welcomed the Kerala government’s decision to sign a Joint Venture with Railways for development projects in the state. He stated that the merger would lead to cohesive development in the state. About the resources spent he stated that it would be in addition to the funds earmarked in the railway budget.

Prabhu admitted that there was a lack of railway investment in Kerala, and stated that NDA is rooting to reverse this trend. Referring to remittances to the state from Non-Resident Keralites, he said even they could invest in railway projects. “They can develop a railway station”, he said, adding that the key objective was to join hands for development.

Among the presence of Chief Minister Pinarayi Vijayan and G Sudhakaran (PWD minister), Prabhu said that the Railways is also looking into the possibility of converting its hospitals to medical college hospitals.

 
[Source:- Techrader]

 

Now you can stream live 360 degree video on Twitter!

Micro-blogging website Twitter has introduced a new way to see what is happening on Twitter — through live 360-degree video.

“Users can check out live, interactive 360 videos from interesting broadcasters and explore what’s happening with them. They will be able to get an inside look with well-known personalities and go behind the scenes at exclusive events,” Alessandro Sabatelli, Director of AR and VR at Twitter, said on Wednesday.

Although everyone on Twitter and Periscope can watch live 360 videos, currently only select partners can go live in 360 via Periscope and and will be rolled out more broadly during the coming weeks, Sabatelli pointed out.

When you see a video marked with a LIVE 360 badge, you can interact with it to change what you see by moving your phone or swiping the screen, all while watching live.

You can see what is unfolding behind, above, or below the broadcaster’s view for an immersive experience.

Live 360 video is not just about taking you to places you have never been, it is about connecting you with people and letting you experience something new with them.

 

 
[Source:- Techrader]

The best web hosting services of 2017

Whatever size of website you have, this article will help you find the best web hosting services for you as well as the best hosting deals to go for.

The first step is to identify what your needs are – with one eye on future growth of your website – then choose an appropriate plan at the right price. Value for money is not just going for the cheapest. Web hosting companies usually offer three main paid-for tiers of hosting packages.

Shared hosting means youshare a server with other sites and web hosting accounts. The site can often be slower and these plans are for sites that don’t use a lot of bandwidth.

With a dedicated server, you have the entire web server for your own use. Faster performance is pretty much guaranteed.

Virtual Private Servers (VPS) or Cloud Servers enable you to scale resource as and when you need it rather than being restricted by the limitations of a physical server. They draw from a pool of processing power, memory and storage depending on your requirement.

Finally co-located hosting enables you to purchase your own server and, while it will be kept in the vendor’s data centre, you’ll have complete control over it so you can install anything you need onto it.

Some providers arrange their web hosting deals according to business segments (small businesses, e-commerce, artists, resellers), features (WordPress compatibility, email hosting, cloud computing, managed service providers) or platforms (Linux or Windows).

Many packages include a wealth of features that you may or may not place value upon, including control panel, the ability to create online stores easily, easy site builder tools and varying levels of support (either on the phone or live chat).

Our list is made up of UK providers (those with a UK storefront with a UK phone number) as well as some foreign web hosts that comply with several ground rules like having EU data centres, a right to cancel, a cooling period, a full refund policy and/or a free trial period.

So first, we’ve picked out a bunch of deals that are ‘best for WordPress or other features’ followed by a run-down of our favourite deals from the best web hosts.

 

 

[Source:- Techrader]

EU mulls stricter controls on WhatsApp, Skype

The European Commission is set to recommend tighter privacy and security for services like Facebook-owned message service WhatsA

The European Union will in September propose subjecting internet services like WhatsApp and Skype to similar rules as traditional telecommunications companies, a spokesman said Wednesday.

The European Commission, the executive arm of the 28-nation bloc, is set to recommend tighter privacy and security for services like Facebook-owned message service WhatsApp and Microsoft’s video phone portal Skype.

Spokesman Christian Wigand said that “we can confirm that the commission is working on an update of EU telecoms rules” next month to “ensure a high level of protection for people and a level playing field for all market players”.

“The commission is analysing to what extent so-called over-the-top service providers (OTT) like WhatsApp and Skype are providing services that are equivalent to those provided by traditional telecoms operators,” Wigand said.

“The commission is considering whether the scope of the current EU rules needs to be adapted, to maintain consistently high levels of consumer protection, security of networks and servers, and to ensure that regulation does not distort competition.”

A Commission source told AFP that while it was necessary to “stimulate innovation by new players” they had to “make sure there were fair rules for everyone”.
[Source: Phys.org]

No new rate hints as Federal Reserve joins Facebook

The Federal Reserve creates a Facebook page, but offerings thus far add nothing to existing communications

The Federal Reserve expanded its communications strategy Thursday by launching a Facebook page, but there were no fresh hints on the direction of interest rates.

The new page—facebook.com/federalreserve—offered a photograph of the French-designed, Fed headquarters in Washington in its stripped classicist architectural style, and a statement that the Fed would post press releases, speeches, reports and other materials on the page.

But for anyone hoping for new insight into the central bank’s monetary policy plans, the Facebook offerings added nothing to existing communications, which have been criticized for alternately being vague, shifting too frequently and giving too much or too little information.

On Wednesday, the Fed released on its main website the minutes of its July 26-27 meeting, which showed policymakers still divided on the strength of the economy and whether they should raise interest rates soon, with the text saying mainly that they agreed that they want to keep their “options open.”

That came after the Federal Open Market Committee and its members individually repeatedly indicated early this year that more rate hikes were imminent after they made the first increase in the benchmark federal funds rate in nine years in December.

“The aforementioned minutes didn’t offer the market any convincing sense that the Fed is going to be raising the fed funds rate in September,” Patrick O’Hare of Briefing.com said in market commentary.

He said the tentative market reaction to the July minutes “might have to do with a growing level of exasperation over the Fed’s wishy-washy communication.”

[Source: Phys.org]

 

Twitter unveils features to filter tweets, notifications

Twitter has announced two new settings that will allow users to control what they see in their feeds and what notifications they receive.

Twitter says in a blog post that it has modified its notification settings to include the ability to see only notifications from people they follow. It’s also introducing what it calls a “quality filter” that it says can improve the quality of tweets users see. Twitter says the feature will filter out duplicate tweets or content that appears to be automated.

The announcement from San Francisco-based Twitter comes a month after “Saturday Night Live” and “Ghostbusters” star Leslie Jones publicly called on Twitter to do more to curb harassment on the platform. Twitter banned one user in response to the incident.

[Source: Phys.org]