The chatbot approach to app development

chatbot messenger

By David Niki, Comelite IT Solutions

Chatbots are the buzzword du jour and are slated to replace service apps and websites, some believe. While it’s too early to lean make such extreme assumptions, there are intuitive ways bots can be used right now, and a proper usage can have significant impact in app development and reduce production costs.

In this article we are sharing the experience we gained during development of Universal Chat; a bot ecosystem based on Telegram’s Bot API, as well as Facebook Messenger, Skype and Slack—Universal utilizes them all. Continue reading

Advertisements

What are you looking at?

Human eye

By Bryn Farnsworth, iMotions

That’s been the question that has been asked by psychologists and market researchers for decades, and the answer has reliably come from eye tracking technology. Now, as more and more of the devices that we use—from our phone to our car—seek to understand how we interact with the world, eye tracking is being used more than ever.

There are a lot of things happening right now as you look at this screen: Your eyes are tracking the words, and maybe they’re searching for the header, or furtively glancing at the sidebar. This kind of information is critical to market researchers and businesses, who strive to understand how users make decisions (and which of those decisions leads to a purchase). Continue reading

The threat within: Understanding how to defend against the insider threat

Insider threat

By Gary Southwell, Seceon

The insider threat has become one of today’s most pressing cyber security concerns. In 2016, the Insider Threat Report Spotlight found seventy-four percent of organizations feel vulnerable to insider threats—a dramatic year-over-year increase. However, less than half of all organizations (42 percent) have the appropriate controls in place to prevent an insider attack. The survey also provides greater insight on the source of the threats:  “Privileged users, such as managers with access to sensitive information, pose the biggest insider threat to organizations (60 percent). This is followed by contractors and consultants (57 percent), and regular employees (51 percent).” Continue reading

This Is Why The Internet Is Broken: A Technical Perspective on Net-Neutrality

world wide web

By Gur Shatz, Cato Networks

Anyone with hands-on experience setting up long-haul VPNs over the Internet knows it’s not a pleasant exercise. Even factoring out the complexity of appliances and the need to work with old relics like IPSEC, managing latency, packet loss and high availability remain huge problems. Service providers also know this — and make billions on MPLS.

The bad news is, it doesn’t matter that available capacity has gone up. The problem is twofold: the way providers are interconnected and mismanagement of global routes. The same architecture that allowed the Internet to cost-effectively scale to billions of devices also set its limits. Continue reading

6 common misconceptions about computer security

computer security

By Ken Wilson, ThePCDoctor

The world today is more connected than ever, and it will keep going that way. This leaves us open to cyber-attacks and our personal data at risk more than ever. There are myths about security that you should not believe because it leaves you open to these attacks. Continue reading

How machines and humans will coexist in the future

Human robot interaction

By Kris Hammond, Narrative Science

As of late, discussions have run rampant about the impact of intelligent systems on the nature of work, jobs and the economy. Whether it is self-driving cars, automated warehouses, intelligent advisory systems, or interactive systems supported by deep learning, these technologies are rumored to first take our jobs and eventually run the world.

There are many points of view with regard to this issue, all aimed at defining our role in a world of highly intelligent machines but also aggressively denying the truth of the word to come. Below are a few popular arguments of how we’ll coexist with machines in the future. Continue reading