Tag Archive for: development

GBT Roadmaps The Development of a Wearable Version for Its


SAN DIEGO, Oct. 20, 2021 (GLOBE NEWSWIRE) — GBT Technologies Inc. (OTC PINK: GTCH) (“GBT” or the “Company”) has on its roadmap, a wearable version of the qTerm device. The finger-touch version prototype of the device is now under manufacturing; and the company plans to start a wearable version next year. GBT’s qTerm, a human vitals device, is aimed to measure human vitals with the touch of a finger.

According to Gartner’s (Gartner Forecasts Global Spending on Wearable Devices to Total $81.5 Billion in 2021) forecast, the world will spend about $81.5 billion on wearable devices in 2021, a significant rise compared to 2020. This rise is directly correlated with the global pandemic and the importance of health monitoring in our lives.

The qTerm wearable device is planned to have all features of the finger-touch version plus additional features that can be utilized due to its shape characteristics. Upon a user’s permission, an automatic scheduled monitoring feature is planned for on-going health observation. The device’s AI system will learn about the user’s health concerns and conditions, and perform health checks as part of a daily routine, transparent to the user. Even if users forget to take vitals measurements, the device will do it automatically for them. Based on the device’s cognitive and reasoning capabilities, automatic vitals measurements will be taken continuously throughout the day. In case of abnormal results, the device will alert, and advice on further steps; the device can be integrated with clinics and hospital data systems to keep and monitor patient’s records. It will be able to directly alert physicians about any health-related concerns and could also be used during telemedicine sessions. The wearable device plans to use optical sensors technology with an advanced display. Additionally, a web portal synchronized with a mobile application is planned to support qTerm’s wearable version. And just like the finger-touch version, the data will be securely kept and transferred to a back-end AI program for further analysis and monitoring. Due to the device’s nature, GBT will continue evaluating the addition of more wearable-oriented features…

Source…

Deakin University lays out proposed School of IT restructure – Strategy – Training & Development – Cloud – Security – Software


Deakin University is proposing to cut academic staff in areas such as data science, cyber security and distributed systems and bring in more teaching resources focused on “emerging” technologies.

The proposed changes are part of a university-wide restructure, called Deakin Reimagined, that will result in a reduction of 180 to 220 positions across the institution.

Specific change proposals are currently the subject of staff consultation; a change proposal for the School of Information Technology, sighted by iTnews, shows reductions in several study domains, partially offset by a shift in the focus of IT-related study towards “emerging technologies” – including quantum computing, internet of things (IoT) and blockchain.

Under the proposal, two vacant positions in the school will not be replaced, and an additional 18 academic staff face cuts.

They include professors and senior lecturers in “computer and data science, artificial intelligence & machine learning”; four lecturers in “information and emerging technology”; professors and senior lecturers in “cyber security” and “distributed systems”; and lecturers in “software engineering” and “mathematics and optimisation”.

Crucially, the cuts would impact several “Level E” professors in these fields. 

Under Deakin University’s academic levels, E is the highest tier and denotes someone that has national and/or international recognition “as an eminent authority in his or her discipline”.

Five “Level E” professors would be cut under the plan, offset by the hire of one “Level E” professor in “software engineering/telecommunications”.

The intention of the restructure is in part to shift the focus of the School of Information Technology from these domains to more emerging ones.

It unveiled plans to hire 13 new academics, mostly at lower academic levels, in areas such as robotics, blockchain, quantum computing, machine learning, IoT, and cyber security.

However, the change proposal also notes that the restructure would result in a “reduction of cost” and meet a “shift in expectations around teaching delivery, technical expertise, and innovation”.

A…

Source…

In Worrisome Development, ‘Skimmers’ Hack Gas Pumps to Read Credit Cards


A “skimmer” circuit board found inside a gas pump in San Diego County. Courtesy San Diego County Agriculture, Weights and Measures

A former San Diego Police Officer, Larry Avrech, had gotten a heads up from another former cop about keys being sold on the Internet that could open up gas pumps. Their first question was, is this legal?

Their second question was, why would anyone want to open up a gas pump?

The images Avrech found online showed two “gas pump replacement lock keys.”

The answer comes from Brian Krebs, a former newspaper reporter who is an expert on computers and Internet security. 

“For decades, only a handful of master keys were needed to open the vast majority of pumps in America,” Krebs said. “That has changed, but I bet there are some older stations that haven’t yet updated their locks.”  

Source…

University of South Australia creates CISO role – Training & Development – Security


The University of South Australia (UniSA) is recruiting its first ever chief information security officer.

The Adelaide-based university kicked off its search to find an “an exceptional leader” to ensure UniSA’s digital and information assets stay protected.

UniSA chief information officer Paul Sherlock told iTnews the new role was added to boost the university’s cyber security focus.  

“The role is all about taking our existing cyber security framework and strategic plan forward and developing investment plans going forward that we can implement,” Sherlock said.  

UniSA experienced its own cyber attack in May, forcing the school to disable desktop computer access and a number of systems, including staff email and remote access.

Sherlock said the university was able to resolve that incident “very well”.

“We invoked our cyber incident response plan and we came out of that incident very well in terms of no lost data and no data exfiltration,” he said.

Sherlock said the creation of the new CISO position was not in response to the May incident.

Rather, he said, the general threats around cyber security had increased during the pandemic, requiring a stronger response.

“I think it’s on everybody’s radar,” he said. “Criminals are more active… it’s a big business.

“Cyber is a big money-making business for criminals and so it’s getting bigger and more sophisticated all the time.”

Source…