The pace of smartphone innovation has slowed from the breakneck speed of a few years back. In fact, the most recent tweaks to brand-new models have tended to be more about refining existing features than rolling out indispensable new technology. What that means is that slightly older models — the flagships of two or even three years ago — can offer a great deal for users looking for an upgrade that won’t break the bank.
Saving and protecting children for decades, UNICEF, the United Nationschildren’s agency, has been implementing new ways to reach families more quickly, efficiently and cost-effectively. In honor of World Creativity and Innovation Day, meet five innovations that are making 2020 the start of a decade of good — even in the midst of all the negative news we see everyday. Learn the details in the full Medium article here.
Here's the latest tech trends from Lisa Cini, Founder/CEO at Mosaic Design Studio and BestLivingTech.
(BPT) - Technological advancements are helping aging adults stay safe, comfortable and connected as they age in place. And, families can feel more confident about mom, dad and the grands living independently, especially around the holidays.
“The year 2020 brings new innovative technologies to enable us to address the unique challenges we face as we age,” says Lisa Cini, president/CEO, Mosaic Design Studio and BestLivingTech.com. “Even the simplest tasks, like going to the bathroom, turning on the faucet, or cleaning up afterward can be difficult or dangerous for aging adults, but by integrating the latest gadgets into our home designs, seniors can remain safe, connected and independent.”
Lisa’s 2020 tech trends include:
BestLivingTech.com offers many of the available products above to help seniors embrace aging and independent living. As a boomer living designer, Lisa searches the world for the best technology to help people age in place and brings them all together in one online store — think Sharper Image meets AARP.
By keeping the home retrofitted with the latest technology, we can help our parents and grandparents stay safe and comfortable at home and eliminate some of the worry when we’re not around.
Lisa Cini, ASID, IIDA, is an award-winning, internationally recognized designer with decades of experience developing interiors that improve quality of life for seniors. She is the author of The Future is Here: Senior Living Reimagined, Hive: The Simple Guide to Multigenerational Living, and BOOM: The Baby Boomers Guide to Leveraging Technology, so that you can Preserve Your Independent Lifestyle & Thrive.
What you need to know to make the best tech decisions for your small business.
(BPT) - The PCs you choose to power your small business can dramatically impact your company's productivity and competitiveness. However, many small businesses fall for common myths about computers, leading to poor purchasing decisions.
Here are four myths about PCs — and realities to help you make smarter technology decisions for your business.
Myth 1: Consumer PCs are interchangeable with business PCs
Reality: Because they're built for activities like watching videos, checking email and surfing the web, PCs for the consumer market will not always have the computing power or security features sophisticated business applications demand. If a family laptop reluctantly boots up or crashes, it's annoying, but not serious.
For a business, however, computers are mission-critical. Employees are more likely to run multiple applications simultaneously, use resource-heavy applications or use software as a service (SaaS). PCs built for consumers often lack the computing power to handle these tasks — resulting in lost productivity.
Consumer-level PCs may also lack built-in security features of computers designed for businesses, which could make your business — and sensitive customer data — vulnerable to cyberattacks.
Myth 2: RAM is the top factor in computer performance
Reality: Adding more random access memory (RAM) usually allows a computer to manage more data. But RAM alone won't improve a computer's performance — unless the PC has sufficient processing power. To make a PC faster and more efficient, you need a powerful central processing unit (CPU) to optimize the RAM. While RAM is the memory, the CPU (or processor) is the computer's "brain," receiving instructions, performing calculations and processing information.
To run today's resource-intensive business software efficiently, look for computers with plenty of RAM plus processing power, such as PCs combining an 8th Gen Intel(R) Core(TM) i5 processor with Intel Optane memory — delivering up to 2.5 times more responsive handling of everyday tasks and up to 66% faster web performance compared to 5-year-old PCs.
Myth 3: You can wait until PCs fail before replacing them
Reality: Long before a PC fails, its performance may suffer, costing your business time and money. Waiting for an older PC to start up every day can waste up to 11 hours a year. Crashing, freezing or slow computers can keep your employees from working efficiently, and may appear unprofessional to customers or clients. Sluggish, malfunctioning PCs can reduce employee satisfaction, as workers become frustrated with outdated technology.
Don't wait until your business PCs slow to a crawl before upgrading. Be proactive. Look for hardware that exceeds your software vendor's recommended system requirements. This will help ensure your PCs can handle future software upgrades. Then set a regular schedule for upgrading your hardware.
Myth 4: You're saving money by repairing old PCs
Reality: Repairing or adding RAM to squeeze more life out of older computers may seem economical. But the cost of keeping older PCs running quickly adds up. According to Intel(R)-commissioned research from J.Gold Associates, repairing breakdowns of a five-year-old computer costs an average of $662 per year. The same research found 43% of the small businesses surveyed had PCs that were over five years old — and malfunctioned each year. At that rate, you'd soon be spending more on repairs than on a brand-new, more powerful computer.
Besides losing productivity during breakdowns and repairs, older computers are also slower. Using five-year-old PCs can make your employees up to 29% less productive, potentially costing your business up to $17,000 per year, per worker.
Older PCs can also put your business at risk of cyberattacks. Per the J.Gold Associates survey, small businesses estimated that 34.47% of their computers over five years old had been hacked. With the average cost of a single data breach worldwide estimated at $35,745 per employee, an older PC rapidly becomes an expensive liability.
In the same survey, small businesses reported that just 5.92% of their PCs newer than one year old had experienced cyberattacks. Newer computers frequently offer built-in security features to reduce risk of cyberattacks. If you've updated to Windows 10, upgrading to a PC with the 8th Generation Intel(R) Core(TM) processor can help you focus on growing your business instead of worrying about cybersecurity.
Blindly accepting myths about PCs can be expensive for your small business. Upgrading to more powerful computers can optimize the performance of your business software, enhance your cybersecurity and boost employee productivity. The next time you're making decisions about computer purchases, be sure you base your actions on reality. Then choose the right PCs to make your business more competitive.
Learn more at Intel.com/smallbusiness.
 Performance results based on testing as of March 2, 2018, and may not reflect all publicly available security updates. See configuration disclosure for details. No product can be absolutely secure. Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including performance of that product when combined with other products. For more information about performance and benchmark results, visit Intel.com/benchmarks. As measured by SYSmark 2014 SE Responsiveness Subscore comparing 8th Gen Intel(R) Core(TM) i5 8400 (16GB Intel(R) Optane(TM) memory module) vs. Intel(R) Core(TM) i5-3330 (HDD Only).
 “Just waiting for an older PC to start up every day, an employee can waste up to 11 hours a year” is based on a 2018 web-based survey commissioned by Intel and conducted by J.Gold Associates, LLC., of 3,297 respondents from small business in 16 countries (Australia, Canada, China, France, Germany, India, Italy, Japan, Mexico, Saudi Arabia, South Africa, Spain, Turkey, UAE, UK, USA) to assess challenges and costs associated with deploying older PCs. Assuming one start-up per day and using an average start-up time calculated by taking the midpoint of the time that survey respondents estimated it takes to start up a PC over 5 years old, employees were estimated to spend up to 11 hours a year starting up a 5-year-old PC (4.07 minutes X 5 days per week X 52 weeks per year divided by 60 (to get to hours) X utilization rate of .67 so 4.07 X 5 X 52 / 60 X .67 = 11.8). Full report available at Intel.com/content/www/us/en/business/small-business/sme-pc-study.html.
 The J.Gold study is based on a 2018 web-based survey, commissioned by Intel and conducted by J.Gold Associates, LLC., of 3,297 respondents from small business in 16 countries (Australia, Canada, China, France, Germany, India, Italy, Japan, Mexico, Saudi Arabia, South Africa, Spain, Turkey, UAE, UK, USA) to assess the challenges and costs associated with deploying older PCs. J.Gold research indicated that the failure of a PC under warranty cost a company $1,070 for each failure, and the cost of failure for a machine out of warranty was $1,525. We can allocate a cost per user per year based on the above calculated costs of failure (assuming an in-warranty failure cost for year one and a non-warranty failure cost for all other years) where: Cost = 43.42% (average failure rate) X $1,525 (cost of failure outside of a warranty) 1 (usage from Q2). Full report available at Intel.com/content/www/us/en/business/small-business/sme-pc-study.html.
 Ibid. “Using five-year-old PCs can make your employees up to 29% less productive” is based on the productivity impairment respondents estimated was attributed to using a five-year-old PC multiplied by the average amount of time respondents estimated was spent on a PC.
 Ibid. “Potentially costing your business up to U.S. $17,000 per year per worker” is based on survey respondents’ estimates that for PCs more than five years old, employees would be up to 29% less productive. Based on an average assumed employee’s salary of $60,000, the lost productivity cost will amount to $17,000.
 Ibid. Allocating the cost of a malware attack or data breach by employee can be calculated by the following formula: $35,745 (Cost per employee) = 34.47% (average percentage that have had a breach) X $103,705 (the average cost of the breach).
 Ibid. “Small businesses had reported that just 5.92% of their computers had experienced cyberattacks” is based on the responses to a question in the J.Gold 2018 web-based survey.
(BPT) - Resourceful thieves and cybercriminals continue to find new ways to hack U.S. consumers’ sensitive personal information. Dumpster diving, stolen or lost wallets and mail fraud should still be concerns, but the digital age of tablets, smartphones, PCs and Wi-Fi networks leaves people more vulnerable than ever.
Have you ever stored credit card information on your phone for added convenience to make payments in a checkout lane? Do you ever store passwords in apps to transfer funds between accounts? And what’s to keep hackers from accessing a wireless network you check your email on while you’re grabbing a quick cup of coffee?
”More than 15.4 million people a year will experience identity theft, with an average loss of more than $1,000,” said Jane Li, Mercury Insurance’s director of product management. “When one access point closes due to added levels of security, cyberattackers find another. Insurance companies like Mercury provide services that allow homeowners and renters to enjoy the convenience of accessing their connected devices at home and on the go, while also helping to protect customers from the potentially devastating effects of criminal infiltration, cyberextortion and identity theft.”
The following five do’s and don’ts can help stop criminals in their tracks and protect your connected devices, as well as your electronic identity.
Li recommends homeowners and renters speak with their local insurance agent to learn more about the endorsements they may be able to add to existing policies to help safeguard their finances if their identities are compromised or connected devices are attacked.
“It can be daunting to try to regain your financial footing if a criminal takes advantage of you,” said Li. “Insurance exists to help protect consumers from unexpected events and, in this case, it’s better to be safe than sorry.”
(BPT) - As the pace of technology advances, cybersecurity threats do, too. Data breaches, identity theft, phishing and malware make headlines seemingly every day. Internet-connected devices, social media, digital assistants and mobile apps have become indispensable in our everyday lives, but their connectedness makes us increasingly vulnerable to cyberattacks. Recent reports estimate that damages relating to cybercrime are expected to hit $6 trillion annually by 2021.
“It’s impossible to predict when you will be affected by cybercrime,” says Bashar Abouseido, chief information security officer for Charles Schwab Corp. “The best defense is to stay informed.”
It can be helpful to envision your computer and digital devices as a house where you store your personal data. October is National Cybersecurity Awareness Month, so it’s a good time to make sure your digital house is secure. The first step is to understand the ways cybercriminals may attempt to access your data.
Types of cybercrimes
Data breaches occur when there is unauthorized access to sensitive personal information. These incidents often make headline news and can affect large numbers of consumers.
Malicious software, also known as malware, spyware, ransomware and viruses, refers to software programs designed with the purpose of gaining unauthorized access to a mobile app, digital device or computer.
Phishing is one of the most common forms of online fraud and cybercrime. Cybercriminals try to lure you with a fake email sent from what they have designed to appear to be a trusted source or contact that encourages you to click a link or open an attachment in order to extract personal account information.
5 tips to protect your digital house
1. Remodel your digital house: Installing updates is an essential first step.
Think of system updates as basic maintenance to your digital house that is keeping your personal data safe. It can be annoying to see those system update prompts on your computer or mobile device, but software developers are constantly improving their software to repel the latest malware. By keeping your operating system and apps updated, you are making sure that your digital house is as secure as possible.
2. Don’t have a leaky house: Be wary of public Wi-Fi networks.
Using public — and often free — Wi-Fi networks is convenient, but it is a common entry point for criminals to use malware to infect your devices and apps. Use only networks you trust or use your own personal Wi-Fi hotspot if you have one. Never update your devices when you are connected to a public Wi-Fi network.
3. Keep your keys secure: Choose unique access credentials.
Access credentials — usernames and passwords — are the keys that keep your digital house safe and secure. Select credentials that are unique and don’t include personal identifying information such as a name, address or birthday. For added protection, choose two-step verification to access critical online accounts for your banking, retirement or investment accounts. Two-step verification is typically a key or another code provided by the service provider in addition to your primary access credentials to verify your identity.
4. Secure doors and windows: Use only secure websites and app stores.
Web browsers and app stores are like the doors and windows in your digital house. Make sure they are secure by using web addresses that start with “https” and downloading apps only from the Apple App Store, Microsoft Store and Google Play store.
5. Don’t open that door: Delete suspicious emails.
That knock on your cyber front door is the sound of a cybercriminal sending you a phishing email. Be suspicious of emails that come from unknown senders. Use your cursor to hover over questionable links and email addresses to reveal the true identity of the link or sender. When in doubt, don’t click on any links or open any attachments and delete the email immediately.
For more information on more ways to educate and protect yourself from cybercrimes, visit SchwabSafe.
We all know that our military personnel works hard to keep the United States and help keep the world safe. However, it’s easy for the general public to take advantage of the technology that the military has brought about for granted. These three ways that military technology has made the world safer for all of us.
Bollards Protect People and Property
Most people have seen bollards used in public but are unaware of the role they play in public safety. Even though these posts may seem decorative in nature, they keep vehicles away from pedestrians and buildings in a certain area. These posts can be very valuable in preventing further damage during an accident. Bollards have major importance in preventing vehicular terrorist attacks that involve ramming. According to Atlas Security, the most deadly vehicular attack was the Bastille Day attack in Nice, France, which killed more than 80 people. With such attacks remaining a threat, the role that these structures can play in preventing further such attacks is vital.
Sensors Protect Soldiers and Civilians
According to The Heritage Foundation, sensors have played an important part in guiding weapons and detecting hostile forces. Drones are an example of how sensors help provide information that command centers and troops in the field need. One of the outcomes of using this technology is keeping more soldiers and other service members safe. Another major impact that these technology systems offer is helping to protect civilians from attacks. A real-life application of this technology is in the GPS systems that many electronics use today. Information that these systems collect makes it easier to relay necessary information to first responders, as an example.
Advanced Communication Systems Protect Everyone
According to the Defense Systems blog, military operations have always involved an important emphasis on communications. Both military members and civilians are at risk when communications systems are inadequate. Advanced communications systems should prevent interference from hackers to prevent the disruption that such threats can cause. One example of advanced communications that everyone can identify with is the Internet. Even though most civilians don't use the same security level online as the military, the Internet stands out as an example of a communications system that has much of its origins in the military.
Technology originally used in the military has done a lot to keep people both in the US and around the world safe. The more we see how this technology is used in everyday life, the more we can appreciate its importance.
Here’s another article you might like: Why Veterans Make the Best Entrepreneurs
Artificial intelligence and machine learning have become growing parts of technological advances over the past few years, impacting almost every sector from transportation to medicine. In the 20th century, when computer programs were first developed, each line of code had to be written by a programmer outlining exactly how the computer was to respond in any given situation. However, with machine learning, computers are starting to figure out the rules on their own.
According to Tricentis, learning requires following a set of rules presented to the machine as an algorithm. These systems are often used for math-based applications like accounting because it is easy to show the machine what to do when certain conditions are met. With learning systems for artificial intelligence, the machine can begin to add to the programmer-developed rules and come up with its own, potentially better, way of solving problems.
More recent approaches to machine learning are focusing highly on pattern recognition. This is especially the case in fields like medicine and transportation with the goal of creating fully autonomous machines that can solve problems like diagnosing cancer from a scan or expertly navigating a traffic situation.
Currently, AI needs to be fed information from sensors and image data that has already been labeled and processed by humans. This is an incredibly labor-intensive process. According to Deepen AI, a single hour's worth of driving data can take up to 800 man-hours to label and analyze. However, as technologies improve and the methods of machine learning become more robust, computers will begin to take on the analysis task themselves. Simple prototype traffic cameras are already in place in New York City, and similar programs are expanding to other places.
The iterative method uses an initial guess to generate a series of approximate answers that keep being refined. What makes machine learning particularly strong is its ability to improve over time, creating a final program whose details even experts in the field cannot explain. The key to this is using a dataset to repetitively test the program. For example, a simple program can be created that can differentiate pictures of numbers. Programmers can then test the machine with hundreds of photos, and based on the results of the test, the machine can alter its rules, take the test again, and see if it has improved.
Machine learning is becoming a growing part of the technology field, and its applications are only increasing each year. Ultimately, machines will not only learn enough to help us with day-to-day problems but will also understand how to teach themselves new techniques to keep up with human needs.
Read more: What Businesses Need to Know to Get the Most Out of Their IT Team
Interested in Publishing on The Tech Idea?
Send your query to the Publisher today!