Posts

India to Set Up Cyber Labs for Online Capacity Building Programme on Cyber Law – OpenGov Asia

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


Over the past decade, technological innovation has advanced at an increasingly fast pace, creating both opportunities and disruptions in virtually every industry. The postal industry is no exception. According to the report, “Step into Tomorrow: The U.S. Postal Service (USPS) and Emerging Technology,” the Postal Service collects massive quantities of data on an ongoing basis. A challenge is putting this data to its most valued use to improve the customer experience. Changing customer expectations and increased competition for last-mile delivery have resulted in a demand for innovative solutions

Data-driven advanced algorithms and analytics can play a critical role in the design of these new, last-mile solutions. Postal infrastructure is, and will continue to be, supported and enhanced by the use of big data across the supply chain. The Postal Service transports millions of mail pieces and packages through its network every day.

To track where the mail is, how quickly it is travelling to its delivery destination, and identify any problems in the network, the Postal Service scans mail pieces at several points along its route. The network is vast, so the collection and utilisation of this information is best harnessed through data analytics

Data and analytics are at the heart of USPS operations, helping improve the efficiency and quality of services. They inform applications that track packages for residents and business mailers and could make the Postal Service more competitive and improve the quality of the products offered to their customers.

USPS’ Informed Visibility – Mail Tracking and Reporting service, for example, combines actual scans of mail pieces with assumed and logical scans during handling to provide near real-time data on the location of mail in the processing and delivery network and its expected delivery date.

In its research, the Office of Inspector General (OIG) interviewed industry experts and Postal Service management on the future of technological innovation in the postal industry. OIG also reviewed the USPS 10-year plan and asked international mailers and U.S. shippers to identify promising technologies.

Shipping industry representatives stressed…

Source…

China is building a sprawling network of missile silos, satellite imagery appears to show

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


The likely missile field, comprising 120 silos that could potentially house weapons capable of reaching the United States mainland, was documented by researchers at the James Martin Center for Nonproliferation Studies using satellite imagery supplied by commercial satellite company Planet Labs Inc.

The researchers compared satellite photos taken during the past four months with images captured within the past week, finding the missile site covering a grid of hundreds of square kilometers in China’s Gansu province, said researcher Jeffrey Lewis, a Chinese nuclear weapons expert who examined the images with colleague Decker Eveleth, the first person to spot the silos.

Lewis told CNN on Friday that most of the silo construction, which has yet to be completed, has likely occurred in the past six months.

“It’s really a startling pace of construction,” he said, adding that the scope of the buildup was also surprising.

“It’s a lot of silos,” Lewis said. “It’s much larger than anything we expected to see.”

Reports of the likely new missile field came just a day before Chinese leader Xi Jinping said in a nationalistic speech on the Communist Party’s 100th anniversary that China’s rise is a “historical inevitability” and it will no longer be “bullied, oppressed or subjugated” by foreign countries.

“Anyone who dares to try, will find their heads bashed bloody against a great wall of steel forged by over 1.4 billion Chinese people,” Xi added, in comments that later appeared to be softened in the government’s own English language translation.

Satellite images appear to show four Chinese missile silos at various stages of construction.

New protection for China’s ICBMs

Though researchers have identified 120 likely silos, there is no indication they are in use, or will be used into the future. However, analysts said the silos, placed in a grid pattern, at 3-kilometer (1.9-mile) intervals, could be used to house Chinese-made DF-41 intercontinental ballistic missiles.

The DF-41, also known as the CSS-X-20, is estimated to have a range of 12,000 to 15,000 kilometers (7,400 to 9,300 miles) and could be equipped with up to 10 independently targeted nuclear warheads, according to the Missile Threat Project at the Center for Strategic and International Studies.

“It is projected to be able to strike the…

Source…

Building permits temporarily unavailable due to ransomware attack |

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


City officials said it could be several weeks before weekly building permits will be available.

The Tulsa World will resume publishing city building permits on Sundays for new commercial construction, expansions and enlargements of more than $50,000 when they become available.

Source…

Building the Android of UAVs with Open Source

T-Mobile is Warning that a data breach has exposed the names, date of birth, Social Security number and driver’s license/ID information of more than 40 million current, former or prospective customers who applied for credit with the company. Get Secured Now with Norton 360


Nowadays, the interaction between a user and a drone, and a drone and its hardware is mediated by software. For that reason, developing secure, dependable, well-implemented, and feature-rich software is critical to fly safely and collect the necessary data during a commercial operation. While, on the surface, proprietary software seems to tick all those boxes, the drone industry is currently shifting its focus to open-source technologies.

In 2009, we saw the birth of the Pixhawk* (which became PX4 in 2011) and the ArduPilot (APM) flight-control projects to enable everybody to freely create and use trusted, autonomous, unmanned vehicle systems. As open-source projects, it meant, and still means, the platform’s software source code was freely available on the Internet, providing everyone with easy access to code, software, designs, and features that could be shared, modified, redistributed, and implemented into developers’ applications and hardware, under certain licensing terms – such as GPLv3 for APM and BSD-3 for PX4. While these are two of the leading open-source projects, there are others such as the industry-standard communication protocol MAVLink, QGroundControl, and more.

In 2014, the Dronecode Foundation was founded to make sure all drone software created in an open-source environment stays that way and remains non-discriminative while building a sustainable ecosystem for critical drone components and fostering a collaborative community of top developers, end-users, and vendors. Today, as a non-profit organization that belongs to the Linux Foundation, Dronecode has set the standards over the last decade in the drone industry with PX4, MAVLink, and Pixhawk.

Still in 2014, a DroneAnalyst report from Colin Snow mentioned that thousands of hobbyists and researchers were taking advantage of open-source platforms, whereas most commercial drone operators were using proprietary drone software. For the latter, this was mostly due to the misconception that open-source software couldn’t get certified to be used commercially, and that it was harder to work with than proprietary software since it “lacked” in various fields, such as quality and tech support. This…

Source…