Smart Device & AI Device Usage Statistics

Artificial intelligence is becoming a bigge part of our lives with every passing day. Machine learning programs are gathering ever more data, which they use as feedback to improve their functionality and drive progress. AI technology continues to grow and improve, and so does its applicability in the business world. CEOs and other executives at companies of all sizes have invested in research and development for this exciting new technology. With so much potential for growth, it’s no wonder businesses hope to use AI to gain a competitive advantage in the marketplace. But don’t take my word for it. These three AI facts can help you stay ahead of the curve!

More than 20 percent of WiFi-connected homes now contain smart speakers.

Though business applications for AI are talked about quite often, it’s important to note what’s going on with consumers as well. When you think about it, all business trends ultimately depend on mass adoption from consumers. For example, there wouldn’t be such widespread use of Facebook Ads (which also use AI, by the way) over the past few years if Facebook hadn’t been widely adopted by consumers. It’s never been easier for businesses to reach their target audience on the site now that it boasts more than two billion users.

If more than 20 percent of homes with WiFi have smart speakers, as you can see in the graphic below, it’s going to become increasingly important for businesses to find ways to take advantage of this technology.

Smart Speaker USA statistics

As more consumers adopt this new hardware to get their morning news, find the day’s weather predictions, or remind themselves to take out the trash, it’s going to become a more attractive medium for businesses.

77 percent of people use devices with AI capabilities, but  only 33 percent realize they’re using AI.

It’s obvious to some people that AI technology is a part of their daily lives — especially if they have an Amazon Alexa or another smart speaker in their house. However, AI is far more prevalent than many people think. In fact, most people who use AI-capable devices don’t even realize they’re using AI. If you think about it, every single iPhone user who has asked Siri a question has used a form of AI. This just goes to show how rapidly technology is progressing and being implemented into our daily lives; most of us don’t even realize it’s happening.

It’s no wonder that AI is attracting increased attention from savvy folks in the business world. Take it from an expert like Mark Hurd, who claimed, in a LinkedIn article published earlier this year, that “during the next two years, artificial intelligence and the ability to run autonomous software and systems will dramatically reshape how businesses think about technology.”.

Jeff Bezos, the founder and CEO of Amazon, has proclaimed that “we are now solving problems with machine learning and artificial intelligence that were… in the realm of science fiction for the last several decades. And natural language understanding, machine vision problems, it really is an amazing renaissance.”

72 percent of business leaders consider AI to be a “business advantage.”

Jeff Bezos is no fool. He and his team at Amazon had the foresight to see AI coming — hence why Alexa now owns almost 70 percent of the smart speaker market. They anticipated the “business advantage” of AI in the home before most companies caught on and were thus able to get their products to market earlier. That’s what makes AI such a business advantage in the first place: despite its prevalence, it’s still an emerging technology.

As with anything else, the people and companies that can adapt the fastest to take advantage of new trends and technologies (otherwise known as first mover advantage) are often the ones who succeed. As AI continues to develop and evolve, there will be many more opportunities for businesses to implement it in new areas of our lives — it’s just a matter of beating everyone else to the punch. Those who are open-minded, agile, and able to adapt quickly will have the upper hand.

AI has gained serious traction in the past few years, and it’s not showing any signs of slowing down. It’s infiltrated our homes as smart speakers, it’s in the phones we use every day, and it’s even found its way into many famous movies. AI’s capabilities are evolving every day, and so is our understanding of it. But if there’s one thing that you must understand, it’s that if you’re not ahead of the market when it comes to using AI, then you’re already behind.


Deprecated: Function get_magic_quotes_gpc() is deprecated in /home1/hubbixsn/public_html/crunchies/wp-includes/formatting.php on line 4358

Deprecated: Function get_magic_quotes_gpc() is deprecated in /home1/hubbixsn/public_html/crunchies/wp-includes/formatting.php on line 4358
Posted on Categories Smart TechTags ,

Virtual and Augmented Reality: Transforming The Way We Look At The Internet and Data Security

Although many gaming and entertainment platforms have developed countless versions of VR in the last few years, the use of virtual reality is far from a solely game-driven industry. In fact, the implications of VR in the IT world are enough to provide solid proof that this form of virtual technology can be utilized in the business and tech sectors effectively and continuously alike.

However, despite the immaculate list of pros involved in virtual and augmented reality, the question of cyber and data security still remains. In 2016, the number of reported data breaches increased by 40 percent and 45 percent of all breached organizations were in the business sector. With a device such as a VR headset which is not commonly known to boast strong security systems, modern-day hackers can turn the IoT that these devices are connected to into a platform with which to wreak havoc on businesses, government officials, and even consumers.

cyber security

However, with every new case of data intrusion, yet another company stands tall and responds with a solution in order to make this form of technology safer in the interim. Furthermore, companies have begun to utilize things such as Steganography and SpatialOS to prevent rather than play offense in this cyber security war and the results are not only positive but also are reforming the way we look at the internet and technology as a whole.

Virtual and Mixed Reality in IT, Design, and Development

In the last few years, since the first virtual reality prototypes were released, companies and consumers alike have been unable to contain their excitement and their demand. In fact, in 2016, 6.3 million VR headsets were shipped across the globe according to a Super Data Report, and over $2 billion was invested in virtual reality according to a Digi-Capital report likewise.

The implications of virtual reality in business have been immense ranging from 3D modeling and testing all the way to 3-DAT data analysis that allows companies to use 3D VR techniques to assess financial and business data. In turn, the future of virtual and augmented reality continues to expand far beyond its original console-based reaches.

For instance, by utilizing CAVE fully immersive virtual reality along with Haptic gloves such as Neurodigital Technologies’ Gloveone showcased at CES and a motion tracker such as HTC’s VIVE tracker, you can not only test and manipulate models, products, and architectural designs but also be able to feel and interact with them as if they were real objects.

Furthermore, the University of Warwick’s Physics researcher, Richard Wellard, created a research company known as 3-DAT to help reduce the time it takes businesses to discover trends and find ways to improve their business model using 3-dimensional data. This kind of 3D technology can be used to track data for IT portfolio management and business model improvements and can help companies in the IT sector review massive amounts of data with ease.

After being part of a team of researchers from Warwick tasked with the difficult analysis of three-dimensional paths of charged particles in near Earth space, Wellard discovered that utilizing 3D technology to analyze the data reduced the time it took to not only compile but rather analyze said data in a far more efficient manner.

Therefore, he created a virtual reality 3D data modeling company dedicated to making data analysis a virtual effort and allowing companies the ability to actually see their data and determine multiple plans for improvement in far more efficient and interactive way. However, even utilizing software such as FileMaker integrated with RESTful API’s, IBM’s Watson Analytics, or Linux’s R or ROOT tools in the future can become wonderful ways to integrate programs currently being used by your business into a virtual platform for better analysis.

Another way companies have begun to utilize Virtual Reality is through its ability to connect various web design tools in order to make web design a far more interactive and easy-to-use process. Although some speculate this could mean a decline in the need for web designers in the next few decades, the market is still rather small and learning to integrate this new tool in your web design department now may help to gain the upper hand if it does become a more substantial form of design in the future.  By using VR design tools such as Javascript’s API, WebVR, and looking into some of the ways that Virtual Reality design can be used at Mozilla’s MozVR, you can begin to learn VR design on multiple platforms including the Oculus Rift, HTC Vive, and Google Cardboard.

However, with any connection of devices with low-security standards, the threat of identity theft and data breaches still remains. With 6.3 million VR headsets connected to the IoT, the probability of a massive malware infecting said devices and infiltrating personal data from these headsets is immense and the actions that these VR and IT companies take in the next decade will significantly affect the security of their consumers, companies, and government alike.

Virtual Reality, Augmented Reality, and IoT – Is it Safe?

With the demand for Virtual Reality increasing daily, companies looking to be ahead of their competitors in the release of their VR technology chose to bypass many of the privacy and security standards that would make these devices far more safe to connect to the IoT and various other programs and applications in conjunction with them.

On the subject of supply and demand leading to security issues, Ben Smith, CEO of Laduma, stated, “As new developments are rushed to market in order to gain a lead on competitors, there is a risk that mistakes are being made.” Because of the massive popularity that Virtual and Augmented Reality has gained in the last few years, companies were forced to either put out products that were not necessarily secure or forego their inclusion in the massive VR market of 2016. However, it is no surprise that the connection of multiple insecure devices on a network creates a perfect entry for hackers to retrieve the massive amounts of data which Virtual Reality platforms both receive from the users themselves as well as collect without necessary consent for marketing purposes. In fact, Tata Communication’s Srinivasan CR once stated on the subject, “Every device connecting into a network is a potential vulnerability which can be used to infiltrate the network itself and other devices connected to it.”

When the Oculus Rift was released in March of last year, terms of their agreement stated that they would not only receive basic information from users but also far more personal information such as the user’s email, occupation, date of birth, and place of residence in order to build their marketing analytics and target these individuals based on their location, demographic, and interests. On top of this, Oculus Rift users are also tracked via their online transactions and web and app usage patterns in order for the company to specifically create targeted marketing campaigns that include your personal interests and items you either wanted to buy or need for the items you recently bought.

However, although the company claims to have substantial security measures in place, this collection of data in conjunction with the weak devices connected to the server create a massive opening for identity thieves, data manipulators, visual terrorism, and phishing alike. Furthermore, when using augmented reality such as Pokemon Go or Mixed Reality such as the recent creation from Dan Gottlieb, geolocation is highly important and this poses a threat for many individuals with weak security devices as this makes you traceable and can allow hackers to track your daily routine in order to attack you physically (think back to the people luring Pokemon Go players into alleyways and robbing them) or discovering information such as banks and other location that you frequent which can make stealing your identity even more effective.

Lastly, applications such as OpenSimulator Metaverse’s HyperGrid and Content Delivery Networks (CDN) are another way in which hackers have begun to attack VR users and their personal information. With OpenSimulator Metaverse’s HyperGrid, in particular, you are connected along with various other VR devices via hyperlinks, however, these links are often unsafe which allows for hackers to infiltrate the devices and intrude upon the data collected from them.

Similarly, CDN’s have begun to take hold in the VR world since E3 as they allow for companies to deliver content such as new videos with VR compatibility to their consumers using a system of distributed servers based on geolocation, however, DDoS CDN attacks have continued to rise in the last few years as hackers have discovered new ways to infiltrate the firewalls of these CDN’s and create forwarding-loop attacks likewise time and time again. With this said, utilizing CDN’s in VR could lead to countless infected devices and once again create a botnet which could lead to the leaking and theft of countless consumers’ personal data.

Visual Terrorism, Botnets, Facial Recognition, and Phishing

Although identity theft aspects regarding VR are fairly straightforward in nature, visual terrorism, botnets, facial recognition, and phishing are all slightly more unorthodox ways in which hackers have begun to utilize VR to their benefits. Although many consumers are unaware of these malicious forms of cyber attacks and how they work, they continue to pose a serious threat to VR users and companies across the globe.

Visual terrorism, in particular, is a large concern of multiple countries due to the fact that it consists of intensifying the negative effects that using VR have on a person including dizziness, nausea, muscle twitching, blurred vision, headaches, and seizures. By hacking into weak devices and spreading malware that creates loud flashes, bright colors, or spinning screens, hackers can create mass visual attacks on VR users and even be the cause of some consumer’s deaths in the process.

Furthermore, a team of researchers from the University of North Carolina recently discovered a new way to bypass modern face authentication by using synthetic faces displayed on the screen of a VR device. In the past, facial authentication systems were used in multiple different ways including mobile payment and sensitive data safety precautions for larger companies, however, these past recognition softwares could be easily fooled by the use of a picture in from of the screen. However, now these devices focus on nearly 80 different nodes in a person’s face and textures to analyze their faces in a far more complex manner.

Despite this, the University of North Carolina was able to take a few pictures from each of their tested individuals’ social media accounts and create highly accurate 3D models that were then displayed on the screen of a VR device and put up to the camera of the device looking to achieve facial recognition. In doing so, all five apps that were tested were unaware of the difference between the real thing and the 3D model posing yet another unconventional yet highly terrifying security threat for companies and consumers alike.

Similarly, phishing is another way that hackers can utilize this tech for their malicious intent. Phishing is a technique in which hackers create false identities in order to trick individuals into doing things they would not normally do. For instance, by hacking into VR headsets and using fake virtual objects or pretending to be updates for the system, consumers may unwittingly deploy trojans into the network or leak their passwords to hackers leading to a far easier entry way for hackers to manipulate data in the cloud.

Another threat which has been seen quite often in the last year within the IoT, in particular, are botnets spreading malicious malware such as Mirai into connected devices leading to massive DDoS attacks. Mirai malware, in particular uses a table of nearly 60 common factory default usernames and passwords to target devices with weak security and infect them with the malware. From there, these devices monitor a command and control server to to bypass anti-DoS software.

Along with BASHLITE, Mirai Malware infected a myriad of weak cameras connected to Krebs on Security in September of last year and had the largest attack strength in history at 665 Gbps, however, this was far from the most powerful attack on the IoT performed by this malware. In October, only one month after the attack on Krebs on Security, Mirai Malware infected countless more devices and previously infected cameras from the Krebs attack combined with these newly infected devices and joined a network which included multiple high-profile companies on a DNS service provider known as Dyn. This led to the inaccessibility of multiple large websites including Github, Twitter, Spotify, Reddit, Netflix, and more.

This attack set a new record that was staggering at best clocking in with an attack strength of 1.2 Tbps. In response, ARM CEO, Simon Segars, stated, “If you’re a device maker building IoT products, you really ought to be worrying about updating the firmware that’s in it.” In fact, ARM has since then developed Mbed Cloud to help companies push updates to their device’s chips and customize OS in order to prevent malware attacks such as the DDoS attacks on Dyn and Krebs.

On top of this, multiple other companies have begun to take botnet security extremely seriously implementing new devices and programs to prevent data intrusion and DDoS attacks alike. Securifi, launched January 23rd of this year, in particular, has decided to help the IT professionals looking to utilize VR or retrieve data for their company at home by creating a device which specifically defends against botnets to ensure that your home devices with weak security are not affected by hackers in the long run.

What We Learned From Mirai Malware

One key thing that IT professionals as well as both Dyn and Krebs on Security were able to determine by analyzing the attacks was that they primarily came from cameras and DVR’s with weak security. The issue with this is the fact that it showed us that weak security home devices, in particular, are what Mirai tends to target. With this being said, the push for VR without following proper security measures as well as its dependence on the average consumer whom typically does not focus on security and utilizes weak passwords or default settings all too often may be the perfect formula for malware such as Mirai to create its third record-setting DDoS attack.

In fact, multiple companies claim that this attack proves that AI’s utilized in weak security devices like VR headsets and cell phones will undoubtedly be the next systems attacked by malware and hackers in 2017. On the subject, Alex Matthews of Positive Technology even said, “AI agents will be, perhaps, the most dangerous VR objects. AI is a hard task for security checks since the range of its actions and reactions could be pretty wide.” With this said, it is no stretch to assume that 2017 will be the year of VR data breaches and the companies combatting it will continue to help businesses utilize VR without the fear of becoming a victim of data intrusion in the process leading to a continuation in the expansion of VR technology and its profitability alike.

Similarly, after Krebs on Security was attacked, Brian Krebs stated, “The internet will soon be flooded with attacks.” Despite this seeming rather dark in nature, Krebs and the countless other IT professionals witnessing the effects of connecting weak devices to the IoT may not be far off. By analyzing data from attacks such as these two and learning how to counteract them, we can ensure that the millions of VR users out there including the countless professional settings which utilize this new tech for data analysis specifically are not the next target for the malicious world of hackers and their botnets alike.

Using SpatialOS, Steganography, Cloud Security, Botnet and IoT security, and Load Balancing to Promote Data Security

As data security has become an issue in VR through the IoT and multiple companies have seen the incredible impact VR can have on data analysis, 3D modeling, and more, therein lies a disparity between security and insecure devices which multiple companies are choosing to tackle head-on. For instance, when two representatives from the British government came to the company Improbable in order to use their SpatialOS to create a 3D model of the internet, Improbable rose to the occasion with style.

By using SpatialOS, they were able to demonstrate a dynamic model of Border Gateway Protocol (BGP) at scale and study it for various weak spots in order to determine where hackers could attack or were attacking currently. In doing this, they were able to prevent multiple data breaches before they ever became a problem and the use of this form of 3D modeling continues to be an impressive but extremely useful tool for governments to regulate weak devices and the companies providing them.

Furthermore, with companies hopping on the VR bandwagon left and right, accessing data remotely to work from home on virtual models or the testing of products using 3D technology is slowly becoming yet another way for hackers to attack the weak VR devices and access sensitive information from companies world wide. Therefore, the use of steganography in files which can be shared to the VR such as audio or video is slowly becoming a more common process.

With so many of these VR devices connecting to the cloud to become a part of the IoT, companies have tried to target the weak points in cloud security in order to protect these connected devices. However, because of the sheer amount of data being provided, some individuals speculate that using PCI DSS security standards and data anonymization techniques are our only hope at combatting data insecurity.

For instance, with PCI DSS data security standards, they tend to focus on ways to build cloud security as well as CDN security and increase concurrent users and the reliability of apps by load balancing likewise. Furthermore, Teesside University’s Joao Ferreira is a huge proprietor of data anonymization and has even said in the past, “New data anonymization techniques will be required so that the new data being collected by VR devices does not identify its originator.”

Lastly, IoT security measures to prevent botnets have slowly risen in the tech world. In turn, devices such as F-Secure and Norton’s Geodesic Dome have been developed. These devices prevent  your weak home and office tech from being hacked into and also support IoT and cloud security likewise. By using these devices in office VR endeavors, companies can ensure their VR headsets are safe no matter how insufficient the actual technology may be and reap the benefits of virtual reality in business without the unfortunate consequences all too often associated with it in return.

In the end, it is not surprising that these incredible virtual and augmented reality headsets are becoming the bricks with which the future of technology in business is paved. However, by knowing where to step on this road and ensuring you remain safe in the process, you can continue on into the future without falling victim to the crippling effects a data breach can have on your business. With this said, the future is now, virtual reality is finally a reality, and the impact on the internet, security, and our lives that it will have continues to expand each and every day.

Smart Home Trends And Statistics

Up until recently, all the hype surrounding the smart home movement was just that – publicity driven by technology companies in an effort to entice consumers. For years it seemed as though something were missing from the equation.

Now the field lies at the intersection of several high-tech trends, which finally appear to have reached a level of maturity and sophistication that they lacked in the past. As demonstrated at this year’s Consumer Electronics Show (CES), held in January in Las Vegas, many of the products now on the market represent a big step up from what was possible before.

The home automation arena is expected to be one of the largest tech growth sectors for the next five years. The website Statista has compiled some of the market statistics. Currently, Americans spend an average of $350 per year on smart home devices and services. At the beginning of 2017, 32.5 percent of US homes had voice-activated smart devices. That number is expected to double by 2021. Reports estimate that a total of $14.649 million in revenue can be expected for smart home products before the end of 2017.

At the heart of the newest “smart” goods are improvements in speech recognition technology. They enable a more natural interface than touchscreens or keypads and are widely deployed in today’s digital assistants, like Apple’s Siri and Microsoft’s Cortana. This is important because a new study from Coldwell Banker shows that 72 percent of Americans want to use voice control to interact with their smart home equipment. Perhaps they’ve become familiar with this means of operating their gadgets after trying it out with their cellphones. Parks Associates has found that 39 percent of those with smartphones use voice recognition technology.

While computer hardware and software providers were the initial leaders in popularizing voice-enabled digital assistants, the crown now sits atop the head of e-retailer Amazon. Its Echo speaker and Alexa assistant have proven especially popular with the public, selling more than 5 million units since introduction in 2014. What makes the Echo so enviable is that it’s designed to play nicely with other automated home equipment, offering users a single platform from which they can access all their smart devices. Moreover, Amazon has opened the architecture up to third-party developers, who have released thousands of “skills” for Alexa, expanding “her” capabilities. With a large installed user base and the ability to add more features going forward, Amazon is a key player to watch in 2017 and beyond.

Voice recognition systems use advanced artificial intelligence principles to try to understand what users want based on conversational context cues and the history of previous commands. AI has evolved to the point where it’s capable of using sophisticated algorithms and vast troves of data to communicate and solve problems. In software like the Vivint Sky app, an algorithmically-driven agent is able to ask the user questions and thereby learn his or her behavioral patterns. For homeowners and business professionals alike, this type of AI will soon add a layer of functionality and intelligence to connected devices that enhances all aspects of everyday life. In fact, Gartner analysts estimate that by 2020, 85% of customer interactions will be managed without a human.

Now that cloud computing allows thousands or millions of devices to communicate with each other, they can share their data and experiences to act even smarter than when they first came out of the box. Gartner Research foresees more than 20 billion devices connected through the IoT by 2020. This much quantity becomes itself a kind of quality as large databases of data empower cutting-edge analysis and learning protocols.

Security cameras are some of the electronic systems that stand to benefit the most from advances in artificial intelligence. Several models shown at CES incorporate facial recognition features, allowing them to differentiate between residents and intruders. The momentum this year is toward combining multiple elements into one camera, like integration with lighting systems and motion sensors. Anything that allows a camera to better focus in on and capture events as they unfold has applications in security monitoring. 360-degree fields of view are another compelling reason to invest in the current crop of all-knowing surveillance cameras.

Smart lights mean no more stumbling around in the dark. Bulbs from Lifx produce normal, visible illumination as well as infrared light, which allows cameras to see clearly even at nighttime. Other units contain motion detectors so that your outdoor lights will brighten if you’re moving around your property. Smart thermostats meanwhile keep tabs on the home environment, tracking and informing users of temperature, humidity, air quality and other metrics that contribute to human comfort and well-being. Although there’s little hard data yet on just how effective smart thermostats are, findings seem promising – residents who use them report energy savings of approximately $135 per year.

The best innovations from multiple areas of research are coming together to make the smart home dream a reality. This fact is perhaps nowhere as evident as it is at major trade shows, like the 2017 CES. After reviewing the exciting innovations on display, it becomes clearer than ever before that home automation systems and products will continue to grow significantly in popularity, flexibility, and convenience.


Deprecated: Function get_magic_quotes_gpc() is deprecated in /home1/hubbixsn/public_html/crunchies/wp-includes/formatting.php on line 4358

Deprecated: Function get_magic_quotes_gpc() is deprecated in /home1/hubbixsn/public_html/crunchies/wp-includes/formatting.php on line 4358
Posted on Categories Smart TechTags