How to ask Google Assistant to remember your parking location

At Google I/O 2018, Google had introduced many new features in its Google Assistant app. Since then we have seen a list of features being added to the app and with the growing list it is getting harder for us to keep a track of the features it offers. For instance, do you know that Google Assistant can now pin the location of your parked vehicle on Maps?

Many of us must have faced this problem of forgetting the location of your parked vehicle. But fret not, now you can ask your Google Assistant to remember your parked vehicle location and it will pin it on your map. If you want to use this feature then follow the steps below.

First thing first:

  • You must be using the latest version of Google Assistant app.
  • Make sure your smartphone is running Android Marshmallow or above/ iOS 10 or above.
  • Enable the location services.
  • Google Assistant services should be configured with voice command and it should have access to all the required permissions.
  1. Open Google Assistant by saying ‘Ok Google’ command.
  2. Now you can simply ask Google Assistant to remember your parking location by saying ‘Remember where I parked’.
  3. Google Assistant will record the GPS coordinates into the maps by adding a special parking pin.

Steps to retrieve the parking location and start the navigation

  • There are two ways, you can find the location of your parked car.

Method 1:

  1. Open Google Assistant by saying ‘Ok Google’ command.
  2. Simply ask ‘ Where’s my car’.
  3. It will automatically retrieve the saved location of your car.
  4. Tap on the coordinates to start turn by turn navigation.

Read More Here

Article Credit: GN

Go to Source

How Manufacturing Can Overcome Today’s Industry Challenges

As the Vice President of Global Industry Sales at IFS, Antony’s responsibilities include acting as the Global Industry Director for Industrial Manufacturing and High-Tech Manufacturing as well as managing the other global industry directors.

Antony has over 20 years of experience in the IT industry, including working in the manufacturing sector. Prior to joining IFS in 1997, he held Business Analyst positions with Ford Motor Company and AlliedSignal. During this time, he implemented enterprise resource planning (ERP) software as well as business process improvements.

Manufacturing

QUESTION 1

Some manufacturers still use spreadsheets to prepare quotes. What are the drawbacks of this method and what should manufacturers be doing instead?

Answer: While spreadsheets are good for many things, they were not designed to store documents, notes, email conversations and related information that are essential parts of estimating—and neither are they very good at version control. Relying on spreadsheets for estimating eliminates any chances to effectively collaborate on them as well. We’ve all heard (and experienced) what happens when you email spreadsheets around with team members and you end up updating different versions of the same document.

Also, given the world that we now live in, many regulations have an impact on spreadsheets. Over the last two decades, there has been a growth in regulations that directly affect spreadsheet-based data, with associated compliance being difficult to conform with, if at all possible.

When I visit manufacturers and see their current processes, the estimating spreadsheets are often created by individuals who have very little IT expertise. This means that, eventually, the spreadsheet files become highly personalized and difficult to explain to others. So, when it’s time for a new person to take over as part of a business or personnel change, the new-comer may have to start again from scratch.

Once I show them how estimating functionality is a part of our ERP solution, they immediately see the benefits.

QUESTION 2

What processes should a manufacturing organization automate and what are the benefits of doing so?

Answer: The processes that can be automated using the functionality are the workflow from the estimate process and the subsequent quote process through to the creation of the associated data. These processes are done by different people. So, by automating them, the real-time notification of when someone needs to action their stage becomes the norm and timescales shrink.

QUESTION 3

Which solutions will help increase the efficiency of a manufacturing business and how?

Answer: The efficiency of a manufacturer can be increased in a number of areas, not just in the estimating department. Collaboration between internal departments can be increased. For example, during the estimating process, both the sales and finance teams have access to it and ensure that the budgets, margins and assumptions are correct. This will mean that if the estimate/quotation is approved by the customer, then the details will automatically be converted into an order and BOMs created/updated as required with no need for the re-input of data.

This whole process eliminates redundancy, increases accuracy and breaks down departmental silos and gets teams working more cohesively and efficiently.

QUESTION 4

What unique advantages would a manufacturer gain as an IFS customer?

Answer: The main advantage that manufacturers would gain as an IFS customer is that of having a supplier who is focused on their industry and has a solution that meets their requirements today as well as tomorrow. The manufacturing industry is the largest focused industry at IFS and customer advisory councils ensure that customers can meet senior executives as well as R&D to see and affect what is being developed. The IFS solution allows today’s manufacturer to digitally transform their business with Industry 4.0capabilities and help them on their journey to become a smart factory.

QUESTION 5

There are several IFS customers that have used IFS solutions and expertise to overcome today’s industry challenges. Do you have one that you can share?

Answer: Yes, one example is Mekoprint where the company has digitized its business flows. As Mekoprint’s CIO, Lars Bo Nielsen, says in their customer story:

“Employees use iPads or iPods to view and update everything from production orders and time and attendance registration to information on production, inventory and distribution, work instructions and guidelines, and quality documentation. The entire digital flow is based on IFS business logic, which gives a great overview of the company. All data is live, so if there is a delay in production or shipping, even the sales team knows immediately”

Another example is NEC which has streamlined its operations as well as improved its competitiveness.

Go to Source

Recovery in manufacturing order books promising – CBI

Manufacturing order books recovered and the volume of output increased strongly in the three months to June, according to the latest monthly CBI Industrial Trends Survey.

According to the survey of 388 manufacturers, output grew at the fastest pace since December 2017 in the three months to June, broadly in line with expectations. Growth was broad-based, with output growing in 14 out of 17 sub-sectors, with growth mostly driven by “Food, Drink and Tobacco”, and “Mechanical Engineering”. Respondents anticipate that output growth will slow slightly over the next three months.

Total order books returned to the healthier levels recorded at the end of 2017, while export orders remained stable and well above average, in line with the past 16 months.

Expectations for output price inflation softened to the weakest in almost a year, while stocks levels moved back below the long-run average.

While the CBI expects manufacturers to continue to benefit from robust external demand and the lower exchange rate, overall economic growth is expected to remain subdued due to weak consumer income growth and investment being held back by ongoing uncertainty.

Anna Leach, CBI Head of Economic Intelligence, said: “The recovery in orders and a return to bumper growth in production suggests the lull in manufacturing activity may be over. While risks to demand persist from Brexit and escalating global trade tensions, firms can work with the Government to nurture a pro-enterprise environment that helps UK growth to shift up a gear. There is much within the UK’s control that can be acted on now to lift UK productivity, from building a third runway at Heathrow to investing in the skills of the future.”

Tom Crotty, Group Director of Ineos and Chair of CBI Manufacturing Council, said: “Improvements in order books and strong output growth are good news for UK manufacturers, particularly after the slowdown that we had seen since the beginning of the year.

“But uncertainty remains elevated, from both Brexit and anti-global trade rhetoric. It is becoming increasingly important for the Government to provide more clarity to UK businesses so that they can better compete at home and globally.”

Key findings:

  • 33% of manufacturers reported total order books to be above normal, and 20% said they were below normal, giving a balance of +13%
  • 20% of firms said their export order books were above normal, and 11% said they were below normal, giving a balance of +9%
  • 43% of businesses said the volume of output over the past three months was up, and 13% said it was down, giving a rounded balance of +29%
  • Manufacturers expect output growth to slow slightly in the coming quarter, with 30% predicting volumes to increase, and 12% expecting a decline, giving a balance of +18%
  • 16% of companies expect average selling prices to increase in the coming three months, with 3% predicting a decline, giving a balance of +13%
  • 16% of firms said their present stocks of finished goods are more than adequate, whilst 8% said they were less than adequate, giving a balance of +8%.

The survey was conducted between 25th May 2018 and 13th June 2018. 388 manufacturers responded.

Across the UK, the CBI speaks on behalf of 190,000 businesses of all sizes and sectors. The CBI’s corporate members together employ nearly 7 million people, about one third of private sector-employees. With offices in the UK as well as representation in Brussels, Washington, Beijing and Delhi, the CBI communicates the British business voice around the world.

Go to Source

Extreme Networks introduces AI-powered edge network solution to accelerate business transformation for enterprise customers

The convergence of technology, users and devices at the network edge, coupled with insatiable demand for secure, reliable connectivity, has created unprecedented complexity for enterprise IT teams that need to manage it all.

To help provide the simplicity and intelligence today’s businesses require, Extreme Networks, Inc. has announced Smart OmniEdge, a powerful artificial intelligence (AI)- enabled network edge solution that offers enterprises the ability to deliver an exceptional customer-driven experience with pervasive intelligence, business adaptability and intrinsic security to accelerate their digital transformation.

Extreme Networks’ Smart OmniEdge solution is comprised of a secure, unified wired/wireless infrastructure and AI-driven management capabilities, accessible through a single pane of glass. The solution provides common visibility, policy and authentication services across the entire infrastructure. Purpose built to address the growth of users and internet of things (IoT) devices, Smart OmniEdge uniquely delivers a consistent customer-driven experience across diverse network environments, via flexibility of on-premise deployment or as-a-service offering. The resulting network and insights give customers the agility required to grow and adapt quickly as their business needs change, while protecting their investments.

The Extreme Networks Smart OmniEdge solution family includes Extreme’s leading wired, wireless, network management, cloud, analytics and security capabilities. New technologies being introduced today are designed specifically to enhance the edge network experience, and include:

  • ExtremeAI for Smart OmniEdge – A powerful, hosted application that augments human intelligence with proactive artificial intelligence to simplify the complex task of RF management. The solution uses machine learning to collect network analytics, device statistics, connection rates and user and application experience characteristics. This enables the network to continuously learn and adapt to a customer’s clients and applications accessing the Wi-Fi network.
  • ExtremeCloud Appliance – Designed for customers that love the simplicity of the ExtremeCloud solution and want an on-premise solution. ExtremeCloud Appliance delivers cloud-like licensing and management with tightly integrated services and features on-premise deployments require. ExtremeCloud Appliance is container ready for operational expansion. It is also available as a virtual machine (VM) for customers that have their own private cloud services.
  • Extreme Extended Edge Switching – An innovative technology that collapses multiple network layers into a single logical switch, enhancing the intelligence of edge switches, while flattening the network and eliminating deployment complexity. The result is a simplified operational model that reduces costs.
  • Extreme Defender for IoT – A comprehensive security solution that simplifies onboarding and securing of wired IoT devices. The Defender for IoT application can be deployed on the ExtremeCloud Appliance in any form factor, and used to help ensure secure access of IoT devices plugged into the wall jack AP or the Extreme Defender Adaptor. The solution provides centralised visibility and management, enabling IT to analyse traffic flows and pinpoint anomalies. The solution works with the Extreme Fabric Connect solution or over third-party networks to protect IoT devices, and is ideal for healthcare environments.

Smart OmniEdge incorporates pervasive intelligence throughout the solution to provide mobile users with an exceptional experience and drive business and operational transformation. The solution is agile and business adaptive, allowing networks to quickly transform in lockstep with the businesses that rely on them using any combination of solutions to meet their business needs today, and in the future, without rip and replace, or retraining.

As the network edge has become the primary access for users, devices and IoT, it has also become an attack surface. Smart OmniEdge is intrinsically secure, from the Wi-Fi RF, access point and Ethernet switches which extend through the campus to the data center, with automated compliance checks, threat detection, analytics and mitigation from the time of IoT device onboarding until completion of the user’s session.

90-Day No-Pay Financing through Extreme Capital Solutions

The Smart OmniEdge solution’s unique network consumption model enables Extreme Network partners to offer on-premise and as-a-service solutions to fit customer’s unique requirements. Extreme offers 100% in-sourced services and support for Smart OmniEdge customers, delivered by Extreme employees. With the introduction of Smart OmniEdge, Extreme is offering a promotion for new customers through network partners, global system integrators and federal partners which enables them to acquire the Smart OmniEdge solution today and pay nothing for the first 90 days when they finance through Extreme Capital Solutions. Alternatively, customers can choose from financing options tailored to best meet their business needs.

Executive Perspectives

Mike Leibovitz, Senior Director of Mobility Solutions, Extreme Networks
“As enterprises embrace digital transformation and look for infrastructure that evolves to support new technologies, Smart OmniEdge is a game-changer. Our solution provides intrinsic security across a single architecture with consistent management, hardware and user experience across different deployment types – all enhanced with artificial intelligence. This takes the complexity out of network management while providing flexibility and choice of deployment model so our customers can focus on their digital transformation.”

Brandon Butler, Senior Research Analyst for Enterprise Networks, IDC
“Enterprise networks today often rely on disparate wired/wireless hardware and software each operating with unique functionality. With Smart OmniEdge, Extreme Networks uses machine learning technology to streamline operations across complex network environments, which increases automation and delivers intrinsic security. Extreme Networks offers these capabilities irrespective of the consumption model, be as an appliance or as-a-service, giving customers deployment choice without compromising on features.”

Gavin Camilleri, Managing Director, Datrix
“Extreme Networks’ Smart OmniEdge solution is a fantastic investment for enterprises that are growing and need to adapt quickly as business needs change. The multi-cloud architecture makes the solution highly adaptable to specific business needs, which provides investment protection for customers. The flexibility enables enterprises to achieve their digital transformation goals, which is a tremendous value that we’re excited to offer to network managers.”

Maarten van Geloven, Alliance Manager, Vosko
“As an Extreme Networks partner, we’re thrilled about the launch of Extreme’s Smart OmniEdge solution and the ExtremeAI technology behind it. The machine learning and artificial intelligence that support this solution will transform our customers’ networks and businesses. From enabling network automation to improving security, we’re confident our customers will see results from this new solution, and that our bottom line will benefit because of it.”

Availability

Extreme Networks’ Smart OmniEdge solutions will be available worldwide in CYQ3, 2018.

Go to Source

‘I am very worried,’ says cybersecurity expert on Liberty hack

A cybersecurity expert has questioned the security measures Liberty put in place prior to a data leak that has put the information of its customers at risk.

Liberty Holdings’ share price fell nearly five percent on Monday midday as the insurer battled to douse the fire caused by a data breach in its IT systems.

Liberty said on Sunday that it became aware of the attack when an external party alerted the firm that it had seized data from the insurer and threatened to release it if it was not compensated for the hack.

The company said there was no evidence that any of its customers had suffered any financial losses.

Liberty said that it was at an advanced stage of investigating the extent of the data breach, which at this stage seemed to be largely emails and attachments.

However, Andrew Chester, managing director of Ukuvuma Cyber Security, was critical.

“Liberty claims that it is in control of its technology and data infrastructure after a massive data breach, but the fact that hackers could extract data undetected is alarming. Cybercriminals are now claiming a ransom to not release the information of Liberty’s top clients, and this news has sent panic alarms through the insurance and finance industries.

“Why did Liberty have unstructured email data and attachments that were left unmonitored and, more importantly, why was this sensitive data not encrypted? When doing threat hunting or a security analysis for any company, the first thing one looks for is how easy it is to extract data without being detected.

“Additionally, how did the hackers know where to find the data? If it was an inside job they might have been tipped off, but if it wasn’t, it means that they spent enough time on the infrastructure to know where to look, which is very alarming,” he said.

Chester said another point to consider was how the hackers had gained access.

“It most likely happened in one of two ways: it was either an inside job or someone with the correct privileges was hacked, which means they could have used that person’s permissions to get into the system.”

This could have been avoided simply by applying general data security practices such as always encrypting sensitive data, segregating it from vulnerable systems, and building in rigorous access control and monitoring systems.

Read More Here

Article Credit: Citizen

Go to Source

Businesses rank low in cybersecurity awareness

What is most concerning is that, as the report underlines, most businesses and industries in Uganda have minimal awareness of their own needs when it comes to cyber security.

 

As cybercrime rises across the globe and new initiatives in Europe and the US aim at improving cybersecurity and enhancing data protection, Uganda still seems to be lagging behind.

Businesses in Uganda score very low on awareness of the threats posed by hackers and other bad actors and they do not seem prepared for attacks that might cost them a lot in damages and mitigation expenses.

Ugandan Businesses Unprepared for Cyber Attacks
Preparedness across sectors in Uganda is very low, according to a recent report compiled by the Global Cyber Security Capacity Centre at the Oxford Martin School at the University of Oxford.

What is most concerning is that, as the report underlines, most businesses and industries in Uganda have minimal awareness of their own needs when it comes to cybersecurity.

The corporate culture in the country is not focused on digital security and even though the private sector is trying to catch up, there are usually only a few people within each business that are really aware of the issues. By contrast, financial institutions like banks are often more up to speed.

They are trying to raise awareness within the work environment, have a grasp of the risks that might put them in danger, and are actively trying to increase their capabilities. SMEs also seem more or less aware of threats, but they do not have the expertise and skills required to know how to respond to them appropriately.

Outdated Operating Systems and Internet Browsers a Major Security Risk
The trend is in line with the reality within the government infrastructure as well, as the report points out that most government employees are not trained on cybersecurity issues and efforts for raising social awareness are scarce and insufficient.

Read More Here

Article Credit: NV

Go to Source

Working through the cybersecurity skills gap

It’s no secret that there’s a shortage of qualified personnel in the field of cybersecurity. It’s a problem that has long been noticed and one that is projected to get even worse—to the tune of 1.8 million by 2022, according to (ISC)².

Despite this massive skills gap on the horizon, the number of breaches appears to be declining. Appearances, however, can be deceiving. As criminals shift their tactics toward new types of threats, such as ransomware, they’re finding ways to do more than merely steal data. Ransomware attacks allow criminals to lock or delete data altogether, which ends up costing organizations more than a traditional data breach—despite it not being quantified by ‘records breached.’

With an expanding pool of threats to deal with and a shrinking pool of qualified people to address them, how do we tackle this serious problem? The obvious answer is recruiting more qualified people to do the job. But simply increasing our ranks isn’t going to fully resolve the problem. Security professionals need to implement a multi-pronged approach to deal with the different aspects of the ‘threats’ challenge at hand. Here are four major ways we can start better dealing with security threats today:

1. Security by design

All too often, security is an afterthought in design. Unless the product is being specifically designed for security purposes, security features are often tacked on toward the end rather than considered as a key element to the design process. Take the automotive industry, for example. The automobile was designed with the intent of offering people an option for travel that didn’t involve feeding and picking up after horses. Many early cars didn’t even have locks, as they were owned by the very wealthy who had drivers who would stay with the vehicle. Even now, connected cars are vulnerable to having their computer systems hacked into due to all of the IoT components going into them.

According to Gartner research director Ruggero Contu, when looking at IoT devices “a consistent security strategy is all but absent.” If we hope to collectively tackle the cybersecurity problem as more IoT devices coming into play, we must make security an integral part of the design process.

2. Drilling down into security in STEM

The deficit of cybersecurity professionals is something we need to start planning for now. In 2001, Dr. Judith Ramaley, assistant director of education and human resources directorate at the National Science Foundation, coined the term STEM to describe the educational emphasis that should be placed on driving Science, Technology, Engineering and Mathematics in schools. The term STEM is now commonly used in many countries with the goal of encouraging kids to take an interest in these fields in hopes of building a greater pool of trained professionals for the future.

Read More Here

Article Credit: HELP NET SECURITY

Go to Source

Oracle says migrating on-prem ERP to cloud now easier than upgrade

Oracle’s launched a cloud migration service it says can “reduce the time and cost of cloud migration by up to 30 percent” and “enables customers with applications running on premises to upgrade to Oracle Cloud Applications in as little as 20 weeks.”

oracle-wave-upgrade

CTO and chair Larry Ellison said the “Soar” service makes it easier to migrate from the company’s e-business suite to cloudy Oracle applications “than it is to upgrade from one version of E-Business Suite to another”.

Ellison said Soar currently works on E-Business Suite, Peoplesoft and Hyperion, and will eventually come to “our full suite of products”.

“A lot of tedious transitions that people once did manually are now automated,” Ellison added, explaining that the service starts with an “Evaluator” that detects customisations in an e-business suite implementation so they can be reproduced in the Fusion ERP cloud. A “Configuration Analyser” then scans your E-Business Suite to discover things like users, memory requirements, disk capacity and automatically replicates that in the cloud.

Data is then extracted from the Suite “transformed and loaded into Fusion ERP”. More than 100 “integration accelerators” are then available to build links from Fusion ERP to other clouds and applications, among them Salesforce and SAP.

The automation’s not magic: Oracle said it reduces the time require to migrate to its cloud “by up to 30 per cent” and making it possible in “as little as 20 weeks.” Which is still a fair slab of time. But Ellison said the payoff is worth it because once you’re in the cloud you’ll never have to do another upgrade because you’ll be in SaaS-land.

Ellison thinks SaaS-land is just about nirvana, because constant improvements will unlock innovation and turn you into a white-hot engine of disruption – and that’s just with today’s features like voice interfaces thanks to Siri and Alexa. Ellison’s also keen on security and revealed a little about how Oracle’s cloud does it. “The computers that we put into our cloud are a little different to the computer that Amazon and Microsoft use,” he said. “We have separate application and security processors attached to the same computer.”

“The application processors can’t see into the security processor’s memory and vice versa.”

He also pointed out that Oracle staff cannot see customer data.

“We can see memory use and I/O and if there is an attack, but we cannot look at your account balances or who your users are,” he said.

Ellison also revealed that Oracle already has “between five thousand and six thousand customers” for Fusion ERP, with “about four thousand” live and in production.

Oracle clearly wants you there, too, regardless of whether you use its applications or infrastructure. Ellison made a strong case for you to make that move. Your Oracle rep may make a stronger one still: analyst firm Gartner recently warned that Big Red may be using arm-twisting tactics to get you there.

Go to Source