article thumbnail

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

3D Printing Design & Implementation. 3D Printing Design & Implementation. Cloud infrastructure and mobile applications are still major aspects within the field using project management and technical approaches like SCRUM which employs real-time decision-making processes based on actual events and information.

article thumbnail

Amazon’s Halo tests the limits of personal privacy, and offers a glimpse of the future of health

GeekWire

“Find a well-lit area and try to avoid light from behind,” a voice from the app instructed me as it prepared to conduct a high-tech, 3D body scan. For example, the company says body scans are processed in the cloud but encrypted during transmission and deleted after processing. The audio clips are not sent to the cloud.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: What Star Wars Can Teach Us About Threat Modeling

ForAllSecure

Having a common framework around vulnerabilities, around threats , helps us understand the information security landscape better. Literally, how the rebellion fighting the Empire has echoes in how we approach and mitigate information security threats. But in information security, it's not always true.

article thumbnail

7 key questions CIOs need to answer before committing to generative AI

CIO Business Intelligence

“We take a photo of your teeth with your phone and we generate a 3D model representation and we can project with AI what a straightening plan would look like, how long it would take, and what it would look like when we’re done.” There aren’t a lot of distinguishing marks, so getting an accurate 3D model from your phone is a difficult task.”

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

It was a 3D puzzle writ large. And I talk about the need for military brass to better understand computer security if they are going to enact policies that involve computer security. What’s a good entry point for starting CTFs or information security for that matter? No, what hooked me was Myst.

article thumbnail

The Hacker Mind Podcast: Shall We Play A Game?

ForAllSecure

It was a 3D puzzle writ large. And I talk about the need for military brass to better understand computer security if they are going to enact policies that involve computer security. What’s a good entry point for starting CTFs or information security for that matter? No, what hooked me was Myst.