Unboxing – The Resmed S+ The world’s first non-contact sleep sensor #Resmed #Sleep

This is just a quick unboxing of the Resmed S+ sleep monitoring device, The take a tour of the unit before we set it up and test it out and see if this works..This is actaully the worlds first non contact sleep sensor so you do need to wear anything or have any attachment on your bed so it just sits beside your bed on your locker paired to your smartphone…

 

 

Features

  • Measures your breathing and body movements throughout the night
  • Analyzes light, noise and temperature levels in your bedroom
  • Creates daily sleep scores and charts to help you understand your sleep pattern
  • Delivers personalized feedback based on your sleep pattern, bedroom environment and daily habits
  • Syncs seamlessly with your smartphone or tablet

See more here 

Stuck for what to get your tech-enthusiast dad for #FathersDay ? #iStorage has some ideas. #tech

Ultra-secure iStorage diskAshur is the latest gadget to have: Super speed USB 3.1, PIN authenticated, hardware encrypted portable data storage drives with unique EDGE technology.

With Father’s Day just around the corner, are you stuck for ideas on what to get for your ultimate gadget and ‘tech loving’ dad? With a dad who always wants the latest device and with ‘state of the art’ James Bond type features, look no further than iStorage and their new diskAshur range of colourful hard drives and solid state drives – perfect for storing family and work documents without the fear of the data getting lost or stolen!

iStorage, the award winning and trusted global leader of PIN authenticated, hardware encrypted portable data storage devices, launches their new range of USB 3.1 the diskAshur hard drive and diskAshur solid state drives all of which are designed, developed and assembled in the UK.

Featuring Enhanced Dual Generating Encryption (EDGE) technology making them THE most secure data storage drives available on the market – super spy like!

EDGE™ Security Features:
One of the unique and underlying security features of the GDPR compliant diskAshur² hard drive and diskAshur² SSD is the dedicated hardware based secure microprocessor (Common Criteria EAL4+ ready), which employs built-in physical protection mechanisms designed to defend against external tamper, bypass laser attacks and fault injections. Essentially the drives feature technology that encrypts both the data and the encryption key, giving you confidence that private information is secure and protected.

So in short, without the PIN, there’s no way in! and you can’t get more ‘James Bond-esque’ than this!

Ideal for users looking for an easy to use secure solution for storing all their data, elegantly designed and available in 4 striking colours (Phantom Black, Ocean Blue, Fiery Red and Racing Green) meaning there’s plenty of technological features to get to grips with. In capacity options from 128GB to 2TB, there will be space for all the family.

 

 

The science bit:
With software free set up and operation, the diskAshur HDD and diskAshur² SSD is platform/device independent meaning it works across all operating systems including all versions of MS Windows, macOS, Linux, Android, Chrome, Thin Clients, Zero Clients and embedded systems.
In fact, the drives will work on any device with a USB port!

Additionally, with an ultra smooth fascia that doubles up as shock-absorbers, the drives being water and dust resistant (IP 56 certified) and supplied with a stylish and sturdy travel case, the iconic contemporary design also features an integrated cable which can be conveniently stored away when not in use.

In addition to EDGE technology, the following common features are included:

*   Brute Force Hack Defence Mechanism – Intelligently programmed to protect against all forms of Brute Force Attacks. Upon the 15th consecutive incorrect PIN entry, the diskAshur drive assumes it is being attacked and will delete the encryption key and lock itself, rendering all data previously stored on the drive as lost forever. At this point the drive can be reset to factory default settings and redeployed.

*   Self Destruct Feature: Users can pre-program the diskAshur drives with a unique Self Destruct PIN which, once entered, instantly deletes the encryption key rendering all data previously stored on the drive as lost forever.

*   Unattended Auto-Lock Feature: Set the drive to automatically lock after a pre-determined amount of time where the drive has not been used.

*   Wear Resistant Epoxy Coated Keypad: Designed with protection in mind, the diskAshur range offer a wear resistant epoxy coated keypad which hides key usage to avoid tipping off a potential hacker to commonly used keys.

For more information on iStorage or to find out how the iStorage EDGE range of diskAshur HDD and, diskAshur SSD can help protect your family’s confidential data, visit www.istorage-uk.com or contact +44 (0) 20 8991 6260.

UK gift retailer Menkind to Launch music making bands #SoundMoovz #Tech #Music #TechToys

UK gift retailer, MenKind has been chosen as the official launch partner for the innovative music making bands called SoundMoovz; available to pre-order now, SoundMoovz allows you to make music by movement rather than dancing to the beat and is the must have wearable tech of 2017!

SoundMoovz are wearable motion-activated musical bandz (RPP £49.99) that send a Bluetooth signal to the SoundMoovz App on your smart device. By simply moving your wrist and/or ankles; you can create beats, rhythms and music or layer your beat onto a song. Connect to a wireless speaker for louder music, the only limit is your imagination.

 

 

 

Paul Kraftman, Chairman of Menkind, says: “Tech toys are advancing every day, giving children and adults new creative outlets to express themselves. We are particularly excited to be launching SoundMoovz here in the UK because it combines creative technology with full body movement to get kids and adults energised and active, whilst having fun creating their own beats. Remember the popularity of the Dance mat? SoundMoovz takes music making and dancing to the next level so if it can be half as successful at getting families moving, then fantastic!”

SoundMoovz was developed by Japanese tech engineer and dancer, Daigo Kusunoki. SoundMoovz The bands use Bluetooth to pair up with an iOS or Android app to provide 400 different sound clips, from instruments to specific genres such as hip hop, rock, pop and to fun sounds like Robotics and Kung Fu. The possibilities are endless!

 

 

 

The Character Group, a company known for its toys and youth tech is the UK Distributor of SoundMoovz. Group Marketing Director, Jerry Healy commented:  “Menkind is the perfect retail partner to launch SoundMoovz into the UK market. They have a clear passion for delivering innovative and fun products to a broad demographic. We are particularly excited to see the instore execution and engagement with consumers!”

 

 

 

SoundMoovz will be available to purchase only from Menkind from 1st July, however with just 1200 pieces available for the first four weeks customers will be able to pre-order online now by visiting www.menkind.com/soundmoovz.

Hostelworld launches verbal Google Cloud translation capabilities on its hostel-booking app #hostels

Hostelworld, the largest online hostel-booking platform sparking social experiences, launches an extension to its iOS and Android app – allowing users to instantly translate between up to 43 languages in a fun and engaging way.

Utilising Google Cloud Translate software, the ‘Speak the World’ translator makes the Hostelworld app not only to enable travellers to book over 35,000 hostels, but also speak fluently in 43 languages. It helps travellers to go even further off the beaten track and fully immerse themselves in the local culture by eliminating language barriers.

 

 

 

Speak the World will feature 43 languages including Bengali, English, French, Hindi, Japanese, Romanian, Spanish, and Thai[i]. Available on iOS and Android, the app allows global travellers to overcome language barriers in real time.

With just a few simple taps the translator is ready to go; simply speak into the device’s microphone and wait for your words to be translated. The feature will then listen to the response and translate that back to you, and so on. In addition, the device’s screen can be set to show a comedic mouth and lips that move with the words, providing the ultimate icebreaker when meeting new people.

 

 

Powering this development is Google Cloud Translate’s neural machine translation, which by utilising state-of-the-art training techniques has achieved the largest improvements to date for machine translation quality.

 

 

 

Breffni Horgan, Head of Product at Hostelworld, said:  “The Hostelworld app already allows people to find and instantly book quality affordable accommodation with personalised itineraries showcasing the best things to do whilst travelling. With the launch of ‘Speak the World’ the app will now empower travellers to go even further off the beaten track and more fully immerse themselves in local culture. Our amazing selection of more than 35,000 hostels has already helped young travellers get over the cost barrier, and now with the help of new technology we’re helping them tackle the language barrier in a fun way, too.”

 

The Hostelworld is available to download from the Apple AppStore and Google Play. 

Stop turning up to distant business meetings in a creased suit. Meet the #PLIQO bag.. #Travel #Bags

British business writer has invented the Pliqo collapsible garment bag

The clever PLIQO bag means you never need to travel in your suit again. It allows you to fold and pack your suit,Laptop and carry it as hand luggage, and unpack it in perfect condition when you are at your destination. Once the PLIQO bag is folded down to size it is classified as a ‘laptop bag’ or ‘handbag’ by major airlines meaning it can be carried onto the plan in addition to a conventional hand luggage bag.

Featuring a folding jacket hanger, the PLIQO bag measures only 39cm x 30cm x 8cm, making it simple to stow in every type of cabin bag or case, or carry on its own. For a video on how the PLIQO bag works please see below

 

 

The Pliqo bag was successfully funded on Kickstarter where it raced 400 % of its original target. The Pliqo bag is now available for pre-order via Indiegogo:

Never travel in your suit again with the smartest garment bag in the world.

 

 

 

The PLIQO bag is the brainchild of Patrick Tatham, who used his own travel experiences – and his network of frequent flying friends – to design a product that will make business travel and commuting more comfortable and convenient that ever before. “I want to be relaxed when I’m on the move, not worrying that I will appear in a crumpled suit at the start of my meetings. The PLIQO bag is the solution.”

 

#BlackDuck Center for Open Source Research & Innovation releases 2017 Open Source 360 Degree Survey

 The world’s appetite for open source software is voracious.

Organisations Increase Reliance on Open Source and Acknowledge Risks, But Efforts to Secure and Manage It Effectively are Lagging

In the last year, businesses around the globe significantly increased their use of open source and although they readily acknowledge growing concerns about open source-related security and operational risks, the effective management of open source is not keeping pace with the increase in use.

Those are among the key takeaways from the 2017 Open Source 360 Degree Survey results released today by Black Duck’s Center for Open Source Research and Innovation (COSRI). The COSRI survey comprised 819 respondents primarily from the U.S. and EMEA, 74% of whom were software developers, IT operations/professionals, systems architects, development managers, and security professionals.

Nearly 60% of respondents said their organisations’ use of open source increased in the last year citing: cost savings, easy access, and no vendor lock-in (84%); ability to customise code and fix defects directly (67%); better features and technical capabilities (55%); and the rate of open source evolution and innovation (55%).

Additionally, in terms of open source’s positive impact on business, survey respondents highlighted accelerated innovation (55%) and quality improvement (44%).

 

 

 

Even as their organisations are embracing open source to accelerate application development and increase development agility, respondents expressed concern about license risk/loss of intellectual property (66%); exposure to internal applications to exploitation from open source vulnerabilities (64%); exposure of external applications to exploitation because of open source vulnerabilities (71%); unknown quality of components (74%); and failure of development teams to adhere to internal policies (61%).

Despite those high levels of concern, nearly half of survey respondents indicated their organisations have no formal policies for selecting and approving open source.  And just 15% indicated they have automated processes in place to manage their open source use.

Respondents gave their organisations decidedly middling marks in areas of managing and securing their open source, with slightly more than half reporting: being in compliance with associated licenses (54%); being aware of known security vulnerabilities (55%); knowing where and which open source versions are currently integrated and deployed (54%); and conforming to internal policies (44%).

“The 2017 Open Source 360 Degree survey responses correspond closely with our experience as we engage with businesses of all sizes in all industries around the world. Companies are using a tremendous amount of open source for sound economic and productivity reasons, but today most companies are not effective in securing and managing it,” said Black Duck CEO Lou Shipley. “This is surprising for a number of reasons. Today open source comprises 80% to 90% of the code in a modern application and the application layer is a primary target for hackers. This means that exploitation from known open source vulnerabilities represents the most significant application security risk most organisations face,” Shipley said.

 

The Open Source 360 Degree survey results show that open source vulnerability tracking and remediation remain primarily manual processes carried out by internal resources (53%). Only 27% of respondents reported automatic identification and remediation tracking of known open source vulnerabilities.

Shipley noted that the survey responses are “also very much in line with results in the open source audits we conduct for our customers.”

Black Duck’s On-Demand business unit conducts hundreds of open source code audits annually, primarily related to merger and acquisition transactions. The recently published Open Source Security and Risk Analysis (OSSRA) report on 1,071 applications audited during 2016 found both high levels of open source usage – 96% of the applications contained open source – and significant risk to open source security vulnerabilities – more than 60% of the applications contained open source security vulnerabilities.

Notably, in that Open Source Security and Risk Analysis (OSSRA) report, audited applications from the financial industry contained 52 open source vulnerabilities per application, and 60% of the applications contained high-risk vulnerabilities. The retail and e-commerce industry had the highest proportion of applications with high-risk open source vulnerabilities, with 83% of audited applications containing high-risk vulnerabilities.

This year’s Open Source 360 Degree Survey conducted by Black Duck’s COSRI is the successor to the former Future of Open Source Survey, co-presented for many years by Black Duck and North Bridge.

A detailed presentation of the complete Open Source 360 Degree Survey results will be available on the Black Duck Website on June 22 following a COSRI webinar discussion of the survey findings.

 

 

 

 

Other notable findings from the 2017 Open Source 360 Degree survey include:

Methods for tracking use of open source: Information provided by developers 54%; Manual design/code reviews 36%; Scans to inventory open source in use 33%

Methods for reviewing code for open source use: Don’t review code for open source (38%); internal tools to scan for open source 27%; third-party tools to scan for open source 28%

Most important elements to a successful open source policy: A structured process for review and approval of open source use requests 42%; A whitelist/blacklist of approved open source components, specific to use cases 39%; A whitelist/blacklist of approved open source licenses, specific to use cases 39%

Prevalent areas for open source usage: Build applications used within our organisation 77%; Build applications used by our customers 69%; Build and run our IT operations infrastructure 69%

Prevalent technology areas for open source use: Development Tools/Software Development Lifecycle 57%; Containers/DevOps/Virtualisation/Cloud Computing 53%; Systems Management/Operating Systems 52%;

Open Source Contribution: 66% of companies surveyed contribute to open source projects.

 

Open Source 360 Degree 2017 collaborators included the following (platinum collaborators are in bold): Appnovation, Bareos GmbH & Co. KG, Black Duck Software, Capital One, Couchbase, Credativ, EnterpriseDB, Grid Protection Alliance, InfoSys, Open Hub, Open Invention Network (OIN), Open-Xchange, Opmantek, (Open Source Academy of Arts, Science and Technology) of Pakistan, Pentaho, Red Hat, Rift-io, Rocket.Chat, Symphony Foundation, univention, WIPRO, WP Engine

SecureAuth Launches Advanced Security for Office 365. #SecureAuth #Office365

Superior identity security with multi-factor authentication and adaptive access control protects most widely used cloud service from increasing attacks

 

SecureAuth Corp., the leader in adaptive access control, today unveiled enhanced protection for Microsoft’s Office 365, the world’s most widely used enterprise cloud service. By providing adaptive authentication for all Office 365 mail clients – including Microsoft Outlook and third-party applications, such as Apple Mail, SecureAuth is protecting one of the world’s most popular SaaS applications from increasing cyber attacks.

 

SecureAuth’s enhanced security for Office 365 provides identity protection and detection using the industry’s most advanced adaptive authentication and risk analysis capabilities, and features SecureAuth’s portfolio of multi-factor authentication methods. This multi-layered security approach combines techniques such as geographic location analysis, device recognition, IP address based threat services, and phone fraud prevention – to name a few.

With 85 million users working on a combination of desktop and laptop computers, mobile devices, and web applications, Office 365 is the world’s most popular cloud service. But wide use of Office 365 also makes it a primary target for cyber attacks especially during complex tasks like Office 365 GCC High and SharePoint Data Migration etc. Breaches tied to phishing e-mail scams and lack of strong identity security are accelerating. Organizations using Office 365 have been forced to rely on traditional and inadequate username-password authentication to try to protect themselves from sophisticated attackers.

 

 

Current versions of Office 365 mail clients support basic two-factor authentication while older Microsoft clients and third-party email applications do not. Enhanced identity security from SecureAuth, adaptive authentication, is the most secure approach for access from any client app that connects to Office 365, including older versions of Outlook and third-party email clients.

 

“Office 365 adoption is second-to-none, which is great for convenience and productivity, but unfortunately makes businesses more vulnerable to attack,” said SecureAuth Chief Technology Officer Keith Graham. “Attackers know that Office 365 is ripe to be exploited, and we see organizations under daily attack. With credentials, preventing the misuse of stolen credentials while maintaining ease of use for end users is paramount. That’s why SecureAuth’s new enhanced protection and detection capabilities for Office 365 offers the highest level of identity security – not only for newer mail clients, but also for older versions which remain widely deployed.”

As with all of SecureAuth’s security solutions, the enhanced Office 365 protection offers a frictionless user experience. The system triggers multi-factor authentication only when it determines a logon to be a potential risk. If there is no risk present, multi-factor authentication is not required, ensuring that access remains easy, convenient, and secure.

With the solution deployed across all devices and both old and new mail clients, organizations are protected no matter how their users access Office 365.

This enhancement comes as SecureAuth continues to expand its portfolio of adaptive access control, multi-factor authentication, and single sign-on products, adding Identity-as-a-Service product Cloud Accesspasswordless capabilities, and detection-orientated abilities to its award-winning adaptive authentication suite.

 

For more information on SecureAuth’s enhanced Office 365 protection, visit www.secureauth.com/office365

#RiskIQ reveals users at risk from hundreds of malicious antivirus apps capitalising on ransomware.

Antivirus mobile apps are here, and they aren’t who they purport to be.

RiskIQ today reveals it has identified hundreds of malicious antivirus apps, capitalising on ransomware fears and putting users at risk.

Using RiskIQ’s mobile database, hundreds of examples of apps that claimed to help defend mobile phones were found to be preying on unsuspecting users by pushing adware, trojans, and other malware.

 

 

 

Using a title search for “Antivirus” resulted in 6,295 total apps, past and present, claiming to either be an antivirus solution, review antivirus solutions or be associated with antivirus software in some way. More than 700 of these apps triggered blacklist detections from the aggregated antivirus vendors in VirusTotal. Trimming the dataset to compare apps only coming from the Google Play store showed 655 results. Of those, 131 had triggered blacklist detections.

 

Please see the full blog for further insight and findings here: https://www.riskiq.com/blog/external-threat-management/malicious-antivirus-apps/

 

 

Traditional Media in a Digital Age by @globalwebindex #Media #ROI #Digital

The way that we produce, distribute and consume media is changing. Indeed, it has already changed a great deal over the last few years. Digital technology has turned the world of traditional media (press, television, and radio) on its head. Whether it survives this transformative period, and in what form, depends on the ability of businesses to adapt to technological developments and changing consumer habits.

One of the biggest changes emerging is the sheer volume of media being consumed digitally. A recent trends report looking at the rise of digital media found that internet users now spend approximately 6 ½ hours online every day. What’s more, the way that way that these individuals access the internet is changing fast. The share of internet time captured by smartphones has risen from 23% to 39% since 2012, with PCs and laptops experiencing a slight decline over the same period. Online users, therefore, represent a huge audience that traditional media outlets cannot afford to ignore.

 

 

Social media, too, has been a game changer. Social networks now represent 32 per cent of online media time and this figure only looks set to grow. Increasingly, individuals are accessing news via social networks, alongside entertainment, consuming content based on what their friends are sharing online. Social media is very much the opinion-maker of modern times, particularly amongst the younger generation, in much the same way that newspapers and radio broadcasts could once claim to be.

However, commentators should not be too hasty when signalling the death of traditional media. Consumers are still spending more than twice as long watching broadcast television when compared to online TV and traditional media still holds a greater sway with rural populations and older individuals. Similarly, broadcast radio and the print press retain a sizeable portion of the market even in the digital age. Evidently, if traditional media outlets are to survive, it is more about evolution than revolution – adapting to new developments without completely abandoning their current methods.

It is also worth noting that some things will remain the same even as many others change and as our reliance on digital media increases, some aspects of the traditional media landscape will continue to be valued highly. Although the digital age has pushed some media outlets toward clickbait headlines and lightweight listicles, there remains room for quality journalism. Not only are audiences showing that they have an appetite for long-form articles, marketers are discovering that it can be a more effective way of monetising their content. As the world of media changes, therefore, content creators must be careful that they do not lose sight of long-established media values.
The change that we are experiencing now is also merely the tip of the iceberg. Media outlets cannot afford to rest on their laurels by assuming that as long as they have a good website and an effective social media strategy they are all set. The industry remains in a constant state of flux and it is difficult to predict future developments that are surely on their way.

 

New devices are being created, or are already with us, that threaten further disruption. Internet connected devices like the Amazon Echo provide another opportunity for individuals to consume media, but also a new challenge to the existing distribution network. With bold predictions being made regarding the Internet of Things, who’s to say that consumers won’t be accessing their media on their smartwatch, internet-enabled glasses, or their home appliances in the not-too-distant future?

The digital age does not represent a clean break from the traditional media distribution and consumption methods of the past. The transition could very well be a messy one as decades-old institutions struggle to adapt to changing technology and consumer behaviour. However, if businesses listen to their audience and remember that there will always be a place for quality content, then they have reason to look towards the future with hope rather than fear.
If you want to learn more about the changes occurring in the world of media, visit GlobalWebIndex for more data and analysis.