article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

As technologists we found the questions informative and insightful and even inspiring (it was great seeing the government prove they are tracking developments in the tech world). 3D Printing Design & Implementation. Agile Software Development. These advantages seem to magnify as the length of each iteration shrinks.

article thumbnail

7 key questions CIOs need to answer before committing to generative AI

CIO Business Intelligence

“We take a photo of your teeth with your phone and we generate a 3D model representation and we can project with AI what a straightening plan would look like, how long it would take, and what it would look like when we’re done.” There aren’t a lot of distinguishing marks, so getting an accurate 3D model from your phone is a difficult task.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Biology

ForAllSecure

And for me at least information security is just like a more complete version of pewter science, it's like, it's like not only creating things, but figuring out how things work, debugging things breaking things and those same skills can can be applied to any other domain. Green: So there are a lot of information security parallels.

article thumbnail

Amazon’s Halo tests the limits of personal privacy, and offers a glimpse of the future of health

GeekWire

“Find a well-lit area and try to avoid light from behind,” a voice from the app instructed me as it prepared to conduct a high-tech, 3D body scan. Another feature invited me to strip down to my underwear for a picture. “Change into minimal clothing so the camera can see your body.”.

article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

that uses both Star Wars and STRIDE to help engineers under vulnerabilities and threats in software development. Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. But in information security, it's not always true.

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

His approachable style and his desire to teach others what he’s learned about information security has resulted in a massive following of half a million subscribers. clearances, especially people who are developers or who are in it, it's kind of rare to actually look somebody else over the shoulder.

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

His approachable style and his desire to teach others what he’s learned about information security has resulted in a massive following of half a million subscribers. clearances, especially people who are developers or who are in it, it's kind of rare to actually look somebody else over the shoulder.

Media 52