Here is a quick overview on some of the recent technology, data security, and recycling related news that HOBI’s blog reported on during the week March 26 – 29, 2018.
IoT May Create a Boost in Employment
The Internet of Things (IoT) and all its connected devices have brought new efficiency into our lives, from helping us in the workplace to our daily tasks – many can’t seem to get through a day without them. And now, it seems like the IoT will help boost job growth. While there is some worry that IoT and advanced technologies will replace employees with automated systems, many experts believe that the growth in IoT will more than likely lead to a job revolution. Yes, AI and advanced software can make processes more efficient, however, humans are still an essential part of the creation and advancement of IoT technologies, as well as the crucial factor in maintaining them. As a result, there’s a growing demand in many sectors of the IoT industry.
The Heated Debate on U.S. Export Regulations
For decades, there has been a fierce ongoing debate on U.S. export policies. However, despite which side you find yourself on, one thing continues to remain true about the topic: Choosing to ship material halfway around the world, particularly to less developed countries, is counterintuitive to the basic goal of managing the domestic e-scrap stream. Yet, while controversial, a majority of the industry relies on exporting. This is what makes U.S. export laws to be a tricky topic to grasp. This article takes a look at how certifications and international law are further shaping export expectations, and how they are aiming to help electronics recovery stakeholders understand the policies, market forces and societal implications that are shaping the way material flows around the globe.
Smart Cities Need Smart Security Practices
When you think of the hyper-connected future, what do you imagine? With smart cities on the rise, it’s clearly evident that we’ll soon begin to see many cities embracing large-scale IoT projects. However, there seems to be a debate on whether this concept is a secure enough future that we should embrace. Without question, we know that technology is the future, but this does not mean that it won’t come without it’s fallbacks. And whichever side of the debate you find yourself on, one truth is clearly evident and that is: Data security needs to be a top priority for connected devices. Having connected devices in our lives certainly makes life easier, but it’s important that users still have control of any personal information that remains on their devices.
How to Protect Yourself from Cryptomining
Recently, we’ve seen a handful of organizations exploiting their online visitors by hijacking CPUs and processors to do the bookkeeping of cryptocurrency networks of Bitcoin and Ethereum. And while it may be a devious and shady practice, ‘borrowing’ someone else’s computer to do your bidding is a legal grey area. Yet, malicious or not, a website that cryptomines without your consent is worrying to the point that you’d probably look to steer clear of such sites, or at least take the necessary measure to protect your computer. Therefore, provided are a few methods users can easily conduct to help protect themselves from cryptomining that may be happening on their CPUs without their knowledge.