Big Tech Firms Cease Processing User Data From Hong Kong

When China imposed a National Security Law in Hong Kong on June 30, tech companies including Facebook, Google, Twitter and Dubai’s Telegram Group ceased processing requests for user data from that city in protest. A Facebook spokesperson said the company believes “freedom of expression is a fundamental human right.” Facebook-owned WhatsApp paused reviews “pending further assessment,” including consulting with human rights experts, of the Chinese law. In addition, TikTok stated it will stop offering its social media app in Hong Kong. Continue reading Big Tech Firms Cease Processing User Data From Hong Kong

Amazon Tests AI Customer Support Agents, Opens Go Market

Amazon is testing two AI-powered systems as customer support agents, one of which will automatically field customer calls without human intervention and the other which will help human service agents respond more quickly to requests. Amazon applied-science manager Jared Kramer said the AI agents rely on machine learning and refer requests they can’t handle to human agents. Amazon also debuted its cashierless “Go” technology in a large grocery store, in advance of possibly licensing the system to other retailers. Continue reading Amazon Tests AI Customer Support Agents, Opens Go Market

Capital One Breach Exposes Data of 106 Million Customers

A hacker accessed the personal data of about 106 million credit card customers and applicants of Capital One Financial, the fifth-largest credit card company in the U.S., making it one of the biggest such breaches of a large bank. Federal authorities arrested 33-year old Paige Thompson, who is accused of breaking through the bank’s firewall to access data stored on Amazon’s cloud service. Most of those exposed by the hack were customers and small businesses who applied for credit cards between 2005 and early 2019. Continue reading Capital One Breach Exposes Data of 106 Million Customers

HPA Tech Retreat: Take a Tour of the Netflix Media Database

In a Wednesday morning session at the HPA Tech Retreat in Palm Desert, Netflix’s Rohit Puri, engineering manager of the Cloud Media Systems team took attendees on a tour of the Netflix Media Database. The Netflix service experience, he explained, is made up of a seamless user interface, personalized content recommendation, efficient media streaming and curated content catalog. Other assets that “go a long way in helping users find content,” added Puri, include promotional artwork and video. Continue reading HPA Tech Retreat: Take a Tour of the Netflix Media Database

Google Hopeful for Chinese Re-Entry With TensorFlow for AI

Google exited China in 2010, but is now making another pitch to re-enter by promoting its TensorFlow software for building artificial intelligence solutions. Sources say that parent company Alphabet has added staff to look for potential AI investments among Chinese companies. The online Chinese market is the biggest in the world, but Google faces challenges there, not just with homegrown rivals such as Baidu, but the fact that China’s firewall keeps domestic developers from accessing Google’s cloud computing services. Continue reading Google Hopeful for Chinese Re-Entry With TensorFlow for AI

Foreign Firms Concerned by China’s New Cybersecurity Law

On June 1, China will begin to implement its new Cybersecurity Law, and foreign companies are worried. China already restricts technology, and the new law will boost tighter control over data and enforce a broader definition of the services and products impacted. Firms are particularly concerned about one regulation that would require them to store information on mainland China, forcing them to rely on cloud providers such as Alibaba and Tencent, which have more local services, as opposed to offerings from Amazon or Microsoft. Continue reading Foreign Firms Concerned by China’s New Cybersecurity Law

Mobile Devices Now the Largest Threat to Enterprise Security

A recent Check Point Software survey determined that enterprise network vulnerabilities often result from the ease in which company employees can now connect their mobile devices to insecure wireless networks. The study suggests that the threat level increases with larger organizations. For example, companies that use 2,000 or more devices experience a 50 percent chance that at least six devices have become infected with malware (something to consider since 82 percent of companies now have a BYOD plan in place). Continue reading Mobile Devices Now the Largest Threat to Enterprise Security