What Amazon Wants From Whole Foods: Data on Shopping Habits

Why is Amazon spending nearly $14 billion for Whole Foods ? One reason: People who buy yoga mats and fitness trackers on Amazon might also like grapes, nuts and other healthy items at the organic grocery chain.

In short, the deal stands to net Amazon a wealth of data-driven insights into how shoppers behave offline — insights that are potentially very lucrative.

To be sure, there are plenty of other benefits to the combination. Amazon will derive steady revenue from more than 460 Whole Foods stores; it can also introduce robots and other automation technologies to cut costs and improve the bottom line. But ultimately, Amazon wants to sell even more goods and services to both online and offline shoppers — including stuff they might not even realize they need.

Amazon has been quiet on its specific plans so far, but analysts are enthusiastic about the possibilities. “This will be a fun time for Amazon,” said Ryne Misso of the Market Track retail research firm in Chicago. “They are introducing a whole new set of shopper profiles that span grocery stores and durables.”

The tracking

Amazon is a pro at using data on past shopping and browsing to prod you to buy more. The home page, for instance, offers quick access to recently viewed items and suggests products “inspired by your shopping trends.” Amazon sends emails about price cuts on items you’ve searched for but haven’t bought — yet.

Brian Handly, CEO of the mobile analytics firm Reveal Mobile in Raleigh, North Carolina, said that while Amazon doesn’t necessarily have better artificial-intelligence capabilities than its rivals, it has scale in the number of shoppers and variety of businesses it has.

Whole Foods can help by giving Amazon a better understanding of what people do at physical retail stores, where 90 percent of worldwide retail spending still happens, according to eMarketer.

Amazon could learn whether a particular customer tends to come once a month to stock up, or make smaller and shorter visits more frequently. Wi-Fi hotspots in stores might collect unique signals emanating from smartphones to figure out which aisles customers spend the most time in. Same with sensors on product shelves, something Amazon is currently testing at a convenience store in Seattle.

“They will break that data down to build stories about their consumers,” Misso said.

All this might feel creepy, but it’s something Amazon already does and does well online. Larry Ponemon, who runs the Ponemon Institute privacy think tank, said he personally would find tracking of his self-described unhealthy eating habits “very creepy.” But he doesn’t expect any consumer backlash because Amazon and Whole Foods have both earned a high level of trust and loyalty.

Reconfiguring the store

To make stores more profitable, Amazon could push customers to order lower-profit bulk items such as detergent and toilet paper over the internet. That would free up store space for higher-profit items, such as perishables and ready-to-heat prepared meals.

Amazon’s challenge will be to “separate the profitable businesses that can be better done online and the profitable businesses that can be better done at retail,” said Larry Light, CEO of the brand consulting firm Arcature in Delray Beach, Florida.

Amazon might find that some items sell better at some locations than others. It can stock just the most popular items at each location; other items are just a click away for home delivery. It’s an approach Amazon is already taking at its eight physical bookstores.

Handly said that even if Amazon can’t get rid of every lower-profit item on shelves, it can use data to figure out ways to drive more customers to those aisles.

Beyond groceries

Amazon will be able to use grocery data to drive other purchases as well. Say you buy a lot of ingredients typically found in Asian recipes. Amazon might then suggest a Thai or Japanese cookbook. It might also recommend a new rice cooker.

It works the other way, too. If you just watched a Mexican food show on Amazon video, Amazon might point you to deals on avocados and perhaps offer subscriptions for regular deliveries of tortillas and canned beans. Or it might automate a grocery shopping list based on a chosen recipe on your Kindle e-reader.

Just bought some camping equipment? Amazon might offer granola bars and other ready-to-eat meals for your hikes. Likewise, someone who just bought a fitness tracker might be in the market for more produce.

Implications for the industry

Walmart remains the leading retailer overall and has its own huge stake in groceries; its retail revenue is more than three times that of Amazon, even with Whole Foods included. Yet it’s on the defensive. To beef up its online operations, Walmart has gone on a spending spree for e-commerce companies such as Jet, Bonobos, ModCloth and Moosejaw. Analysts say these companies should help Walmart get into the data game as well.

“The real challenge of Walmart is they recognize that technology can be bought and technical expertise can be bought,” Light said.

But playing catch-up is “harder than just building it into your company as a core part of the company’s DNA,” said Brent Franson, CEO of Euclid Analytics, a San Francisco company looking to bring data analysis to physical stores. “Amazon has the benefit from Day One of architecting a business that is data-driven, out of the gate.”

Instagram to Filter Spam, Harassment

Instagram is adding a new feature to automatically block any comments that are clearly spam or harassment.

The new filters will track comments that are obviously spam or vulgar harassment and block and remove them. Users will still be able to delete or report other comments or turn comments off on certain posts.

The filter blocking “toxic” comments will first be unveiled in English, but Instagram says it hopes to expand it to more languages over time.

The second filter blocking obvious spam will be introduced in a number of languages including English, Spanish, Portuguese, Arabic, French, German, Russian, Japanese, and Chinese.

The company said in a blog post, “These tools are the next step in our commitment to foster kind, inclusive communities on Instagram.”

America’s Cup Foiling Technology Set to Fly Beyond Racing Boats

From water taxis that “fly” on hydrofoils to aircraft wings and cutting-edge car steering wheels, the America’s Cup has produced technology with potential far beyond its “foiling” catamarans.

With their focus on carbon fiber and aerodynamics, the teams that fought for the America’s Cup attracted partners including planemaker Airbus and automotive groups BMW and Land Rover who were keen to learn from them.

One area where this is likely to have an impact is in harnessing “foiling” technology, where the America’s Cup boats “fly” above the water on foils, cutting water resistance.

“Foiling in small electric boats will most likely appear on rivers in major cities. We are just at the beginning of the foiling adventure,” Pierre Marie Belleau, head of Airbus Business Development, who managed its partnership with Larry Ellison’s Oracle Team USA, told Reuters.

The space-age catamarans used in the 35th America’s Cup, which ended in victory for Emirates Team New Zealand this week, can sail at maximum speeds of 50 knots (92.6 kilometers per hour) and have more in common with flying than sailing.

For Jaguar Land Rover, which sponsored British sailor Ben Ainslie’s attempt to win the cup, the relationship is a strategic one with a focus on technology and innovation.

“We don’t just get our logo onto a sail,” Mark Cameron, the company’s Experiential Marketing Director, said by telephone, adding that the carmaker would be providing more designers to help Land Rover BAR with technology for their next campaign.

Land Rover produced a special steering wheel for Ainslie to use in the America’s Cup, with in-built gear shift paddles that allowed him to adjust the catamaran’s “flight” levels.

The relationship is similar between BMW and Oracle Team USA, with the German automaker focused on areas including the electronics in the wheel used by skipper Jimmy Spithill, the development of carbon fiber used to make the boat and its components, and the aerodynamic testing.

“We like to think of ourselves more as a partner than a sponsor. We have a very strong carbon fiber relationship,” Ian Robertson, who is the BMW management board member responsible for sales and brand, told Reuters between races.

“This is a dynamic sport that is developing fast. … It’s moving quickly just like the car industry is moving quickly. It’s all changing,” Robertson said.

Plane sailing?

The America’s Cup catamarans use similar aerodynamics and load calculations to power their wings as commercial aircraft, which has led some skippers such as Spithill to become pilots.

Airbus is now considering applying the design and method of Oracle’s foils to the tips of aircraft, Belleau said, adding that this would need a two- to four-year certification process and require it to change its production method.

Airbus has also created a new generation of Micro Electro Mechanical Systems (MEMS) microchips that were originally developed for the wings of its test aircraft and then adapted on board the Oracle boat to measure the wind speed and direction at all points on its almost 25-meter-high wing sail.

The sensors make it easier to tell if the wing sails are set efficiently, as wind speed and direction can vary from the top to bottom of the 25-meter wing of the America’s Cup boats — technology that could become standard in the marine leisure industry to replace less reliable wind instruments.

“I would be very surprised if this MEMS technology does not become standard in order to replace the classic anemometer,” Belleau said.

The Airbus A350-1000, one of Airbus’ twin-aisle, wide-body jetliners, is also flying every day using new instrumentation developed through the partnership.

Oracle used Airbus’ 3D printing and manufacturing process to produce stronger and lighter parts that Airbus has started to use on aircraft to replace titanium and aluminum.

“In 10 years from now … this technology will spread and will be on all the sailing boats in the market,” Belleau said. “In addition to the sporting competition, there is still this technological competition. … The story is not finished.”

A Decade Ago, Apple’s iPhone Transformed the World

In the two years leading up to June 29, 2007, when Apple’s iPhone went on sale, company co-founder Steve Jobs and a select team were hard at work secretly designing what would become a global game changer. 

The initiative even had a code name, “Project Purple.” By all accounts, the project was pained. 

Inside a secure room, a collection of super smart techies, ate, slept, worked way beyond the typical eight hour day, fought and, at times overthought, the design of this new slick mobile device.

​Before that day, flip phones, Blackberries and even the occasional pager were commonplace.

Pay phones were rarer still.

Photo gallery: America’s love affair with the ever-evolving phone

Ten years later, Jobs is no longer with us, having passed away in 2011.

But most of the public is hunched over a hand-held device, iPhone or not, accessing the internet, watching videos on demand, and conducting mobile banking. 

Time magazine published the final public video appearance of Jobs before he died after a 10-year battle with pancreatic cancer.

Apple, of course, is still redesigning, and hopefully improving upon, that first, innovative cell phone.

Later this year, the iPhone 8 will be released amid much speculation and apparent premature leaks. 

‘Petya’ Computer Virus Spreads From Ukraine to Disrupt World Business

A new cyber virus spread from Ukraine to wreak havoc around the globe on

Wednesday, crippling thousands of computers, disrupting ports from Mumbai to Los Angeles and halting production at a chocolate factory in Australia.

The virus is believed to have first taken hold on Tuesday in Ukraine where it silently infected computers after users downloaded a popular tax accounting package or visited a local news site, national police and international cyber experts said.

More than a day after it first struck, companies around the world were still wrestling with the fallout while cybersecurity experts scrambled to find a way to stem the spread.

Danish shipping giant A.P. Moller-Maersk said it was struggling to process orders and shift cargoes, congesting some of the 76 ports around the world run by its APM Terminals subsidiary.

U.S. delivery firm FedEx Corp said its TNT Express division had been significantly affected by the virus, which also wormed its way into South America, affecting ports in Argentina operated by China’s Cofco.

The malicious code locked machines and demanded victims post a ransom worth $300 in bitcoins or lose their data entirely, similar to the extortion tactic used in the global WannaCry ransomware attack in May.

More than 30 victims paid up but security experts are questioning whether extortion was the goal, given the relatively small sum demanded, or whether the hackers were driven by destructive motives rather than financial gain.

Hackers asked victims to notify them by email when ransoms had been paid but German email provider Posteo quickly shut down the address, a German government cybersecurity official said.

Ukraine, the epicenter of the cyber strike, has repeatedly accused Russia of orchestrating attacks on its computer systems and critical power infrastructure since its powerful neighbor annexed the Black Sea peninsula of Crimea in 2014.

The Kremlin, which has consistently rejected the accusations, said on Wednesday it had no information about the origin of the global cyberattack, which also struck Russian companies such as oil giant Rosneft and a steelmaker.

“No one can effectively combat cyber threats on their own, and, unfortunately, unfounded blanket accusations will not solve this problem,” said Kremlin spokesman Dmitry Peskov.

ESET, a Slovakian company that sells products to shield computers from viruses, said 80 percent of the infections detected among its global customer base were in Ukraine, with Italy second hardest hit with about 10 percent.

Eternal blue

The aim of the latest attack appeared to be disruption rather than ransom, said Brian Lord, former deputy director of intelligence and cyber operations at Britain’s GCHQ and now managing director at private security firm PGI Cyber.

“My sense is this starts to look like a state operating through a proxy … as a kind of experiment to see what happens,” Lord told Reuters on Wednesday.

While the malware seemed to be a variant of past campaigns, derived from code known as Eternal Blue believed to have been developed by the U.S. National Security Agency (NSA), experts said it was not as virulent as May’s WannaCry attack.

Security researchers said Tuesday’s virus could leap from computer to computer once unleashed within an organization but, unlike WannaCry, it could not randomly trawl the internet for its next victims, limiting its scope to infect.

Bushiness that installed Microsoft’s latest security patches from earlier this year and turned off Windows file-sharing features appeared to be largely unaffected.

There was speculation, however, among some experts that once the new virus had infected one computer it could spread to other machines on the same network, even if those devices had received a security update.

After WannaCry, governments, security firms and industrial groups advised businesses and consumers to make sure all their computers were updated with Microsoft security patches.

Austria’s government-backed Computer Emergency Response Team (CERT) said “a small number” of international firms appeared to be affected, with tens of thousands of computers taken down.

Security firms including Microsoft, Cisco’s Talos and Symantec said they had confirmed some of the initial infections occurred when malware was transmitted to users of a Ukrainian tax software program called MEDoc.

The supplier of the software, M.E.Doc denied in a post on Facebook that its software was to blame, though Microsoft reiterated its suspicions afterwards.

“Microsoft now has evidence that a few active infections of the ransomware initially started from the legitimate MEDoc updater process,” it said in a technical blog post.

Russian security firm Kaspersky said a Ukrainian news site for the city of Bakhumut was also hacked and used to distribute the ransomware to visitors, encrypting data on their machines.

Corporate Chaos

A number of the international firms hit have operations in Ukraine, and the virus is believed to have spread within global corporate networks after gaining traction within the country.

Shipping giant A.P. Moller-Maersk, which handles one in seven containers shipped worldwide, has a logistics unit in Ukraine.

Other large firms affected, such as French construction materials company Saint Gobain and Mondelez International Inc, which owns chocolate brand Cadbury, also have operations in the country.

Maersk was one of the first global firms to be taken down by the cyberattack and its operations at major ports such as Mumbai in India, Rotterdam in the Netherlands and Los Angeles on the U.S. west coast were disrupted.

Other companies to succumb included BNP Paribas Real Estate, a part of the French bank that provides property and investment management services.

“The international cyberattack hit our non-bank subsidiary, Real Estate. The necessary measures have been taken to rapidly contain the attack,” the bank said on Wednesday.

Production at the Cadbury factory on the Australian island state of Tasmania ground to a halt late on Tuesday after computer systems went down.

Russia’s Rosneft, one of the world’s biggest crude producers by volume, said on Tuesday its systems had suffered “serious consequences” but oil production had not been affected because it switched to backup systems.

UN: Terrorists Using ‘Dark Web’ in Pursuit of WMDs

The U.N.’s disarmament chief warned Wednesday that terrorists and non-state actors are using the so-called dark web to seek the tools to make and deliver weapons of mass destruction.

“The global reach and anonymity of the dark web provides non-state actors with new marketplaces to acquire dual-use equipment and materials,” U.N. High Representative for Disarmament Affairs Izumi Nakamitsu told a meeting of the U.N. Security Council.

The dark web is a part of the internet that requires special software to access and allows users and website operators to remain anonymous or untraceable, making it appealing to criminals, terrorists and pedophiles.

Nakamitsu said that dual-use items are complicating their efforts to address the risks posed by WMD.

“We must keep in mind that many of the technologies, goods and raw materials required for developing weapons of mass destruction and their means of delivery derive from legitimate commercial applications that benefit many people,” she said. Nakamitsu added that it is important to strike the right balance between collective security and commercial opportunity with preventing proliferation.

Weapons of mass destruction include nuclear, chemical, radiological and biological weapons.

“While there are still significant technical hurdles that terrorist groups need to overcome to effectively use weapons of mass destruction, a growing number of emerging technologies could make this barrier easier to cross,” Nakamitsu said.

In addition to the dark web, she said the use of drones and 3-D printers by non-state actors are also growing concerns. Nakamitsu urged intensified international cooperation to make it harder for terrorists and criminals to illegally traffic sensitive materials.

Chemical weapons

Terrorists have already used poison gas in at least one deadly attack.

In Syria, Islamic State used mustard gas on civilians in the town of Marea in August 2015, according to a U.N.-authorized investigation last year. (The same investigators also concluded that the Syrian government carried out at least two chemical weapons attacks on civilians living in rebel-controlled areas in 2014 and 2015.)

“The use by non-state actors of chemical weapons is no longer a threat, but a chilling reality,” Joseph Ballard, a senior official with the Organization for the Prohibition of Chemical Weapons (OPCW) told council members.

Ballard said the OPCW is working to enhance the security of the global supply chain of dual-use materials and technologies, including working with international customs officials. He said the organization also works closely with the international chemical industry, to ensure that toxic chemicals do not fall into the wrong hands.

Global Cyberattack Hits Indian Port

A global cyberattack disrupted operations Wednesday at India’s largest container port, adding to the headaches of governments and businesses affected by so-called ransomware code that takes a user’s data hostage until the victim agrees to pay for its release.

The problems at Jawaharlal Nehru Port in Mumbai involved a terminal run by Danish shipping giant A.P. Moller-Maersk.  The company had said Tuesday as the attack was spreading largely in Europe and the United States that the malicious code was affecting terminals “in a number of ports.”

Australia’s Cyber Security Minister Dan Tehan told reporters Wednesday that officials have not yet confirmed the same computer virus was responsible for ransomware attacks on two Australian companies, but that “all indications would point to” that being the case.

Ukraine targeted first

Banks, government offices and airports in Ukraine were among the first to report the cyberattack.

Ukrainian Deputy Prime Minister Pavlo Rozenko tweeted a photo of his black computer screen, saying the government’s headquarters had been shut down.

Other international firms that reported being affected include America’s Merck pharmaceutical company, Russia’s Rosneft oil giant, British advertising giant WPP and French industrial group Saint-Gobain.

“We confirm our company’s computer network was compromised today as part of global hack. Other organizations have also been affected,” Merck said on Twitter.

A U.S. National Security Council spokesman said the Department of Homeland Security, the FBI and other agencies are “working with public and private, domestic and international partners to respond to this event and provide technical information for prevention and remediation.”

“Individuals and organizations are discouraged from paying the ransom as this does not guarantee access will be restored,” the spokesman added.

Ransom demands 

Europol’s European Cybercrime Center has told anyone affected by Tuesday’s attack to report the crime to national police and encouraged them not to pay any ransom requested by hackers.

“What is interesting about this particular case is that the email system that is supposed to be used to deposit the Bitcoin ransoms has actually been disabled, so the hackers in this case may not get what they bargained for,” Cedric Leighton, who operates his own crisis management consultancy, told VOA.

WATCH: Related video report

 

Eternal Blue

The computer virus used in the attack includes code known as Eternal Blue, a tool developed by the NSA that exploited Microsoft’s Windows operating system and which was published on the internet in April by a group called Shadow Brokers.  Microsoft released a patch to protect systems from the exploit in March.

A similar ransomware attack last month named “WannaCry” affected computer systems in 150 countries.

Tim Rawlins, director of the Britain-based cybersecurity consultancy NCC Group, says these attacks continue to happen because people have not been keeping up with effectively patching their computers.

“This is a repeat WannaCry type of outbreak and it really comes down to the fact that people are not focusing on what they should be focusing on, the very simple premise of patching your systems,” Rawlins told VOA.

WATCH: Ransomeware basics facts

Tech Innovations for Developing Countries

While technological revolution is changing much of the world, there are still areas that have seen only very small benefits, or none at all. There, people still live without electricity, clean water and basic healthcare. At a competition recently held in Washington, innovators presented affordable new devices, specially designed to help improve the lives of the world’s poorest. VOA’s George Putic reports.

AP Explains: What is Ransomware?

Computers around the world were locked up and users’ files held for ransom in a cyberattack Tuesday that paralyzed some hospitals, government offices and major multinational corporations.

Here’s a look at how malware and ransomware work and what people can do if they fall victim to attacks.

What is malware and ransomware?

Malware is a general term that refers to software that’s harmful to your computer, says John Villasenor, a professor at the University of California, Los Angeles. Ransomware is a type of malware that essentially takes over a computer and prevents users from accessing data on it until a ransom is paid, he says.

How does your computer become infected with ransomware?

In most cases, the software infects computers through links or attachments in malicious messages known as phishing emails.

“The age-old advice is to never click on a link in an email,” said Jerome Segura, a senior malware intelligence researcher at Malwarebytes, a company based in San Jose, California, that has released anti-ransomware software. “The idea is to try to trick the victim into running a malicious piece of code.”

The software usually is hidden within links or attachments in emails. Once the user clicks on the link or opens the document, their computer is infected and the software takes over.

But some of the major ransomware attacks recently, including last month’s WannaCry and the one spreading Tuesday, borrowed leaked National Security Agency code that permits software to spread quickly within an organization’s network.

How ransomware works

“Ransomware, like the name suggests, is when your files are held for ransom,” said Peter Reiher, a UCLA professor who specializes in computer science and cybersecurity. “It finds all of your files and encrypts them and then leaves you a message. If you want to decrypt them, you have to pay.”

The ransomware encrypts data on the computer using an encryption key that only the attacker knows. If the ransom isn’t paid, the data is often lost forever.

When the ransomware takes over a computer, the attackers are pretty explicit in their demands, Segura says. In most cases, they change the wallpaper of the computer and give specific instructions telling the user how to pay to recover their files.

Most attackers demand $300 to $500 to remove the malicious ransomware; the price can double if the amount isn’t paid within 24 hours. The demand in Tuesday’s attack was $300 per computer, according to security researchers.

Law enforcement officials have discouraged people from paying these ransoms.

How to avoid these attacks

The first step is being cautious, experts say. Users should also look for malicious email messages that often masquerade as emails from companies or people you regularly interact with online. It’s important to avoid clicking on links or opening attachments in those messages, since they could unleash malware, Villasenor says.

But Villasenor says there is “no perfect solution” to the problem.

Users should regularly back up their data and ensure that security updates are installed on your computer as soon as they are released. Up-to-date backups make it possible to restore files without paying a ransom.

WannaCry and Tuesday’s attack exploited vulnerabilities in some versions of Microsoft Windows. Microsoft has released software patches for the security holes, although not everyone has installed those updates.

Even so, the new malware appears to have a backup spreading mechanism, so that even if some computers were patched, they can still be hit if one or more machines in a network weren’t patched.

Not Just for Gamers and Techies, HoloLens Gets Down to Business

Tech enthusiasts may be drawn to HoloLens, the head-mounted holographic computer from Microsoft, but company executives say businesses also should consider how it can help improve their bottom line.

The wearable device allows users to interact with holograms using their gaze and simple hand gestures. Virtual interfaces are superimposed onto the immediate environment, combining the real world with a digital one. It’s a form of mixed reality that Microsoft executives say offers more than just entertainment value — it can be put to work in business scenarios.

“We’re seeing mixed reality broadly as a new kind of dimension, literally, of how we’re going to interact with information,” said Greg Sullivan, director of communications for the Windows and devices group at Microsoft.

Companies like German elevator maker Thyssenkrupp have begun experimenting with HoloLens. In a promotional video, an elevator repairman dons a HoloLens headset to begin a work order. The computer assesses the repair situation and displays holographic guidance, along with the ability to conference in an associate located remotely.

The associate can interact within the repair technician’s virtual workspace, “She can sit in her office in Germany and scale her expertise literally around the world … see what they’re seeing, guide them and even ink on their display,” Sullivan said.

WATCH: High-tech HoloLens in Action

Cirque de Soleil

Data visualization is another potential use for HoloLens.

“You can walk around the 3-dimensional representation of that data and it gives you powerful new insights, because as humans, we live in a 3-D world and we understand things better … if we interact with them in three dimensions,” Sullivan said.

That can be useful for creative industries. At Microsoft’s recent “Build” conference for software developers, set designers from Cirque de Soleil demonstrated how holographic versions of their theater sets allowed them to plan ahead. Team members wearing HoloLens could walk around and interact with true-to-scale holograms of their set designs, even inserting virtual avatars of real-life performers.

Architecture and engineering

Other industries that utilize 3-D modeling, like architecture and engineering, potentially can benefit from holographic computing, too. Trimble, a company specializing in GPS technologies, developed an application for HoloLens that allows architects and contractors to manipulate 3-D holographic designs and models in real-life environments, such as construction sites.

“You can have multiple people sharing an experience in mixed reality, look at a digital version of the project … and then make those changes in real time and all see them, and then go ahead and move right into production much, much quicker,” said Sullivan. “The efficiencies that are gained are really profound.”

Chris Silva, research director at Gartner, agrees. “3-D models in health care, extremely complex design documents … they’re a natural fit for something like HoloLens, where stepping into the data really can help get the job done better,” Silva said.

Big investment

But like many new technologies, HoloLens’ price tag initially may deter widespread adoption. The device retails for $3,000 for a developer edition and $5,000 for a business edition that comes bundled with enterprise applications.

“The biggest risk is making an investment in this technology and not having a plan for how it gets used,” Silva said. “These are devices that are two, maybe even three, times the cost of the average laptop, and much more expensive than a mobile device. They’re new, and therefore the organizations aren’t always sure how they’re going to use them.”

Silva recommends that companies take a pilot approach to the technology by introducing it to a single group, picking one process to improve upon and analyzing the subsequent results.

Microsoft’s long-time presence on office desktops means HoloLens eventually could transform everyday workspaces.

“When we look at the average worker model, where this type of technology starts literally replacing people’s monitors on their desks, somebody like Microsoft is well positioned to capture that,” Silva said. “They can plug HoloLens into the way they’re doing business today.”

Overall, Silva is excited for future developments in the mixed reality space.

“This is definitely the next frontier of mobile devices … this could be the next thing that replaces the desktop PC, the iPad, the smartphone in your pocket.”

Small Farm, Meet Big Data

It’s one of the biggest challenges of the 21st century: how to feed a growing population without ruining the environment. Farmers may get some help from artificial intelligence and the Internet of Things. As VOA’s Steve Baragona reports, falling costs and advancing technology may put precision agriculture in reach for more farmers worldwide.

EU Fines Google $2.7 Billion

EU antitrust regulators fined Google $2.7 billion Tuesday for unfairly boosting search results for its online shopping service.

The European Union said Google began efforts in 2008 to boost the service now known as Google Shopping by making its results show up higher in search results, while demoting the search results of rival companies.

The result, according to regulators, was the most highly ranked rival services appeared on average on the fourth page of the results, an area few consumers ever reach.

EU Commissioner Margrethe Vestager said Google has created many innovative products, but in this case abused its market dominance in internet searches.

Google said it will review the EU decision as it considers an appeal to the decision.

“When you shop online, you want to find the products you are looking for quickly and easily. And advertisers want to promote those same products. That is why Google shows shopping ads, connecting our users with thousands of advertisers, large and small, in ways that are useful for both,” Kent Walker, a Google senior vice president, said in a statement.

Vestager said Google denied other companies the chance to compete on the merits and to innovate, and denied European consumers a genuine choice of service.

In addition to the fine, Google is required to give rival comparison shopping services equal treatment, and the company must explain how it will accomplish that.

 

Pakistani Farmers Get Tips via Text

The latest farm tools on the job in Pakistan are cell phones and satellites. A new program is using satellite data to estimate how much water a field needs, and then texting this information to farmers.

The hope is to prevent overwatering. A 2013 report from the Asian Development Bank called Pakistan “one of the most water-stressed countries in the world,” with a 30-day storage capacity, well below the recommended capacity of 1,000 days. The per capita water resources are on par with those of Syria, where drought has helped to fuel a civil war.

The water crisis is being driven by several factors: climate change, an expanding population, local mismanagement and a greater demand on farmers. It threatens to destabilize relations between Pakistan and India, who share the Indus River.

Turning off the spigot

Overwatering is costly for farmers trying to make ends meet. While Pakistan continues to suffer from chronic fuel shortages, farmers must use diesel motors to pump groundwater onto their fields. The lower the water table, the more fuel it takes to pump it to the surface.

And overwatering also reduces crop yields. But many older farmers learned their trade at a time when the water ran freely, and the risks of under-watering are so great that farmers still err on the side of too much irrigation. The Pakistan Council of Research in Water Resources (PCRWR)  found that rice farmers were using more than three times as much water as they needed to.

The PCRWR reached out to the Sustainability, Satellites, Water, and Environment research group (SASWE) at the University of Washington, hoping to use science to inform irrigation choices.

Pakistan’s program started last spring with a 700-farmer pilot. As of January, 10,000 farmers were receiving messages like this one: “Dear farmer friend, we would like to inform you that the irrigation need for your banana crop was 2 inches during the past week.”

The messages come from a fully-automated system that does everything from downloading publicly available satellite data and distributing the text messages to using models to compute how much each farmer needs to irrigate.

A nationwide effort

PCRWR plans to scale up the program for use across the nation, and expects millions of farmers to participate. But first they are reviewing the system. They want to know how easy it is for farmers to use, and how many actually follow the irrigation advisories. And they want to know how accurate it is and how effective it is at saving farmers money.

They are collecting feedback from farmers over the phone.

“I haven’t seen any report yet,” Faisal Hossain of SASWE told VOA, but “we got a story last month from one of the farmers who was telling us how he was able to get, I think, for every acre 700 kilograms more of wheat than his neighbor.” The farmer credited the irrigation advisories.

There are challenges to expansion. They may need to do more work to persuade farmers to trust the technology. As more farmers use it on smaller farms in areas with more varied terrain, the satellite data resolution may not be precise enough for accurate measurements. And small farmers may not be comfortable relying on cell phone technology.

 

But for the most part, cell phones already are fairly ubiquitous in Pakistan. Last year, the Punjab government reported that it would be giving out 5 million smartphones to farmers.

Social Media Giants Join Together to Fight Terrorist Content

Social media giants Facebook, Twitter, YouTube and Microsoft say they are forming a working group to remove terrorist content from their platforms.

The global technology companies announced Monday they are creating the Global Internet Forum to Counter Terrorism which will help them share technical solutions to remove terrorist and extremist postings.

The companies are facing growing pressure from governments around the world to quickly remove hateful content. They have previously begun working together to create fingerprints for videos or pictures with extremist information that can be shared across social media platforms.

The tech firms say the new forum will also help them to commission research to fight terrorist speech as well as to work with counter-terrorism experts.

The forum will “formalize and structure existing and future areas of collaboration between our companies and foster cooperation with smaller tech companies, civil society groups and academics, governments and supra-national bodies such as the EU and the U.N.,” the companies said in a statement.  “The scope of our work will evolve over time as we will need to be responsive to the ever-evolving terrorist and extremist tactics.”

Last week, European heads of state called on tech companies to develop new technology to automatically detect and remove extremist content. Germany has proposed a new law that would fine social media firms up to $56 million if they do not quickly remove extremist postings.

SpaceX Launches 10 Satellites

A SpaceX rocket carried 10 communications satellites into orbit from California on Sunday, two days after the company successfully launched a satellite from Florida.

The Falcon 9 rocket blasted off through low-lying fog at 1:25 p.m. PDT from Vandenberg Air Force Base northwest of Los Angeles. It carried a second batch of new satellites for Iridium Communications, which is replacing its orbiting fleet with a next-generation constellation of satellites.

About 7 minutes after liftoff, the rocket’s first-stage booster returned to earth and landed on a floating platform on a ship in the Pacific Ocean, while the rocket’s second stage continued to carry the satellites toward orbit.

A SpaceX Falcon 9 on Friday launched from Cape Canaveral, Florida and boosted a communications satellite for Bulgaria into orbit. Its first stage was recovered after landing on a drone ship in the Atlantic.  

Billionaire Elon Musk, who founded Hawthorne, California-based SpaceX, believes reusing rocket components will bring down the cost of space launches.  

Iridium plans to put in place 75 new satellites for its mobile voice and data communications system by mid-2018, requiring six more launches, all by SpaceX.

The $3 billion effort by the McLean, Virginia, company involves complex procedures to replace 66 operational satellites in use for many years. Some of the new satellites will be so-called on-orbit spares, or older satellites that remain in orbit on standby for use if the newer ones malfunction.

Swapping out and deorbiting some old satellites has already begun, Iridium CEO Matt Desch said in a pre-launch call with reporters.

Several old satellites have been moved into lower orbits to use up their remaining fuel and configure the solar panels for maximum drag so they will re-enter the atmosphere and burn up.

The first re-entry was believed to have occurred on June 11, Desch said.

“It’s hard to celebrate something like that, but these satellites have put in almost 20 years of service, and making sure we’ve cleaned up after ourselves as we deploy our new constellation is a priority,” he said.

The new satellites also carry payloads for joint-venture Aerion’s space-based, real-time tracking and surveillance of aircraft around the globe, which has implications for efficiency, economy and safety — especially in remote airspace over the oceans.

“This will truly be a revolutionary aspect of air-traffic control,” said Aireon CEO Don Thomas.

The technology, which requires aircraft to be equipped with certain equipment, is undergoing testing involving eight of the initial batch of Iridium NEXT satellites.

The Iridium NEXT program also will bring an end to so-called “Iridium flares,” which space enthusiasts have observed for years. The new satellites will not create visible flashes of reflected sunlight as they passed overhead.

Spyware to Tap Into Smartphones Puts Users’ Rights at Risk

Governments around the world are using surveillance software that taps into individual smartphones, taking screenshots, reading email and tracking users’ movements, according to security experts and civil liberties groups.

The rise of so-called spyware comes as electronic communications have become more encrypted, frustrating law enforcement and governments’ surveillance efforts.

Over the past several years, private companies have begun selling advanced software that first appears as a text message with a link. When a person clicks on the link, the phone becomes infected. A third party can then read emails, take data and listen to audio, as well as track users’ movements.

The companies that sell this spyware exclusively to government agencies insist that the software must be used only in a legal manner, to fight crime and terrorism. However, security researchers and civil liberties groups contend that some governments use the programs to track human rights activists, journalists and others.

​A recent story in The New York Times focused on activists and journalists in Mexico who have received text messages and emails with links that, if clicked on, would infect their devices with spyware. In some cases, the messages appeared to come from legitimate sources, such as the U.S. Embassy.

The Mexican government says it does not target activists, journalists and others with spyware unless it has “prior judicial authorization.”

‘Lawful intercept’

In recent years, there’s been a rise in software sales in what is known as the “lawful intercept” market, said Mike Murray, vice president of security intelligence at Lookout, a mobile security company based in San Francisco, California.

Countries that can’t make their own surveillance software can now buy sophisticated surveillance tools, Murray said.

“What’s new is the enthusiasm [from] nation-states. … It’s a capability they always wished they had. Now they have it,” he added.

Lookout, which makes security software and services, receives monthly information from more than 100 million phones in 150 countries. It has seen spyware “in every kind of contentious place around the world,” Murray said.

Nation-state use

The use of nation-state spyware used to be limited to a handful of governments, said Eva Galperin, director of cybersecurity at the Electronic Frontier Foundation, a nonprofit digital rights group. But now that the price of the spyware has come down, countries can spend a few hundred thousand dollars to get the same capability.

Galperin spent three weeks in Mexico last year training activists. One tip she gives: Users who are not certain that a link in email or a text message is safe should forward it to a separate account, such as Google’s Gmail or Google Docs, to prevent infection.

“We should be very concerned,” Galperin said. “Surveillance malware is incredibly powerful. You have full control of the machine. You can see everything the user can see, and do everything the user can do.”

‘Digital Democracy’ Turns Average Citizens into Influencers in Africa

From cashless payments to smartphone apps offering everything from taxis to take-out food – Africa’s digital revolution is gathering pace as average citizens take an active role in public discourse.

“You’re seeing a lot of the people changing the way they live their lives,” says Maria Sarungi, founder of the #ChangeTanzania platform. “And also creating for themselves wealth, jobs, opportunities. But also to engage politically on a very different level.”

Sarungi’s #ChangeTanzania platform began as a social media hashtag but ballooned into an online social movement with an app and website listing dozens of petitions and initiatives ranging from demands for security cameras at bus stops to a community beach clean.

“Before [it] used to be people sitting on the streets just talking a lot about politics,” says Sarungi. “But today they have become influencers. With the social media platforms, your voice can be amplified.”

In Uganda, the website Yogera, or ‘speak out,’ offers a platform for citizens to scrutinize government, complain about poor service or blow the whistle on corruption.

Kenya’s Mzalendo website styles itself as the ‘Eye on the Kenyan Parliament,’ profiling politicians, scrutinizing expenses and highlighting citizens’ rights.

But the new platforms for political engagement also risk a backlash.

“We are seeing governments trying to control as much as they can the virtual space,” says Sarungi.

The founder of whistleblowing website Jamii Forums last year fell afoul of Tanzania’s Cybercrimes Act and was charged with failing to disclose users’ data.

“We are not against the government, nor judges, nor the police forces,” says Maxence Melo, co-founder of Jamii Forums. “What we are against is the Cyber Crimes Act, which seems to oppress the people.”

Melo’s trial is due to take place next month.

Meanwhile, authorities in Cameroon cut off internet access for millions of people earlier this year following anti-government protests in English-speaking regions on the country. The French campaign group Internet without Borders warns that African governments are increasingly using internet blackouts to stifle political opposition.

Drones, 5G Internet Dominate Talks as Tech Execs Visit White House

Ubiquitous drones and a faster Internet are coming sooner than you might think, and governments are staring into the unknown as they face the prospect of regulating the coming technological revolution in a way that fosters innovation, while at the same time protecting the often conflicting interests of consumers, entrepreneurs and the general public.

It’s Technology Week at the White House, and top industry executives huddled together Thursday with President Donald Trump to show off their wares and talk about what government’s role should be in regulating, and at the same time encouraging the pace of change. The discussion was all about “next generation” lightning-fast 5G wireless services and the exponential growth of drone-related technologies.

“This meeting comes at an important time because we’re on the precipice of moving to 5G and bringing about the Internet of Things,” said Mike Sievert, Chief Operating Officer of T-Mobile, a leading cellphone service provider. “The position that the government takes is going to determine whether or not America continues to lead in technology.”

Sievert was joined by a Who’s Who of top executives from venture capitalists and firms such as Sprint, AT&T, General Electric, Honeywell, Verizon, and Microsoft. Also attending were entrepreneurs from drone industry leaders like AirMap, which produces a platform for drone mapping that is in use at most U.S. airports; and Precision Hawk, which analyzes data gathered by advanced drone technology and sensors for the energy and agriculture industries.

Trump told the group he is committed to keeping the government out of the way to allow the tech companies to grow and prosper.

“[There have been] too many years of excessive government regulation,” Trump told the drone executives. “We’ve had regulation that’s been so bad, so out of line, that it’s really hurt our country. On a daily basis, we’re getting rid of regulation.”

Enabling innovation

Trump’s message did not appear to go down well with the entrepreneurs, however. Precision Hawk CEO Michael Chasen explained to the president the need for government to take a lead role in establishing rules and standards for the drone industry.

“This is the one industry where we need a little bit more regulation,” Chasen told Trump. “Because the default [present state of affairs] is limiting what drone technology can do and we need the FAA and other regulatory bodies who have the power to regulate [to open] up those opportunities so we can stay competitive with other countries.”

Trump said his government wants to provide an environment where innovators can dream big.

“We’re on the verge of new technological revolutions that could improve virtually every aspect of our lives, create vast new wealth for American workers and families and open bold new frontiers in science, medicine and communications,” said the president.

Drone industry experts say sales growth has been phenomenal.

“In the past eight months, nearly 850,000 drones were registered by the FAA [Federal Aviation Administration],” said Brett Velicovich, president of a Washington area drone firm and author of the new book Drone Warrior. “That compares to only 350,000 airplanes sold over the past 100 years.”

Drone concerns

Velicovich said his greatest worry is that governments such as the United States don’t seem to fully appreciate the potential security threat posed by the new generation of cheap, powerful drones in the hands of terrorists.

“Groups like ISIS see how cheap this technology is and how capable it is and how far they can fly away from the remote and the type of payloads you can put on it and so the security implications come from these people and organizations that would try and do us harm,” he told VOA. “They see how readily available the technology is, how cheap it is, and how far it’s come just in the last few months.”

The United States has long been a leader in the use of military drones, and a multi-billion-dollar drone sale is reported to be up for discussion early next week when India’s Prime Minister Narendra Modi pays a visit to the White House.

Reuters reports that India is pushing to buy a naval variant of the Predator drone, which manufacturer General Atomics says can be used for wide-area, long-endurance maritime intelligence, surveillance and reconnaissance missions. It can stay in the air for up to 27 hours and can fly at a maximum altitude of 15,000 meters.

US Official: Russians Targeted 21 State Election Systems

Federal officials say Russian cyber-operatives targeted voting systems in 21 U.S. states last year and had varying degrees of success in penetrating them. VOA’s Michael Bowman reports, that testimony before House and Senate panels Wednesday revealed significant tensions between state election officials and federal agencies whose cooperation is deemed essential to safeguard future elections.

New Girl Scout Badges Focus on Cybercrime, Not Cookie Sales

Cookie sales may take a back seat to fighting identity theft and other computer crime now that Girl Scouts as young as 5 are to be offered the chance to earn their first-ever cyber security badges.

Armed with a needle and thread, U.S. Girl Scouts who master the required skills can attach to their uniform’s sash the first of 18 cyber security badges that will be rolled out in September 2018, Girl Scouts of the USA said in a press release.

The education program, which aims to reach as many as 1.8 million Girl Scouts in kindergarten through sixth grade, is being developed in a partnership between the Girl Scouts and Palo Alto Networks (PANW.N), a security company.

The goal is to prevent cyberattacks and restore trust in digital operations by training “tomorrow’s diverse and innovative team of problem solvers equipped to counter emerging cyber threats,” Mark McLaughlin, chief executive officer of Palo Alto Networks, said in the release.

The move to instill “a valuable 21st century skill set” in girls best known for cookie sales is also aimed at eliminating barriers to cyber security employment, such as gender and geography, said Sylvia Acevedo, the CEO of the Girl Scouts of the USA.

Women remain vastly underrepresented in the cyber security industry, holding just 11 percent of jobs globally, according to a recent study by (ISC)2, an international nonprofit focused on cyber security.

“In our increasingly tech-driven world, future generations must possess the skills to navigate the complexities and inherent challenges of the cyber realm,” Acevedo said in the release.

“From arming older girls with the tools to address this reality to helping younger girls protect their identities via internet safety, the launch of our national cyber security badge initiative represents our advocacy of cyber preparedness,” she said.

Intel Becomes Olympics Sponsor, Will Bring Tech to the Games

Intel said Wednesday it would become a major sponsor of the International Olympic Committee, making the computer chipmaker the latest technology company to put marketing dollars behind the global sporting event.

The new deal, which goes until 2024, comes a week after longtime Olympics sponsor McDonald’s Corp bowed out of its sponsorship deal three years early, citing a change in the company’s priorities as it tries to hold down costs.

Financial terms of the deal were not disclosed, but IOC sources have previously told Reuters that major sponsors pay about $100 million per four-year cycle, which includes one summer and one winter games. The IOC has been looking to increase the cost of those deals, sources previously said.

Intel joins about a dozen global Olympics sponsors such as Coca-Cola, Samsung and most recently, Chinese e-commerce company Alibaba, which signed on six months ago. The IOC has been trying to make the Olympics more technologically savvy and appeal to younger people through its internet-based TV network, the Olympic Channel.

IOC President Thomas Bach and Chief Executive Officer Brian Krzanich said Intel’s sponsorship will open up new experiences for athletes, fans and spectators in emerging areas such as virtual reality.

“We’ll allow people online to feel like they are there,” Krzanich said, speaking at a press conference in New York.

Intel said it would provide 5G wireless technology, virtual reality, artificial intelligence platforms, and drones that could be used in aerial filming or light shows.

Changes for Intel

Intel’s business has undergone big changes in recent years. In March, it agreed to buy autonomous vehicle technology firm Mobileye for $15 billion in a bid to expand its reach beyond its core microprocessor business, which has faced declines along with the personal computer market.

Intel may be seeking to expand its reach in Asia, which is preparing to host three consecutive Olympic Games. Pyeongchang in South Korea is staging the 2018 winter games, Tokyo the 2020 Summer Olympics and Beijing the 2022 Winter Olympics. The IOC is deciding between Paris and Los Angeles for the 2024 summer games.

The IOC is looking to sign pricier deals while brands are trying to figure out whether exclusive Olympics sponsorship rights offer the marketing impact they once did. Some companies find it is much cheaper to work directly with athletes or specific countries than the IOC.

More Olympic partners

Timo Lumme, managing director of IOC Television and Marketing Services, said in an interview that the IOC, with 13 top sponsors, has more partners than ever before, showing that brands see “tangible returns” from investing in the games.

As for the tensions in the Korean Peninsula, Lumme said the IOC is monitoring the situation daily to see if it could effect the 2018 games.

“We feel very sure and comfortable and that the Korean government will provide a safe environment for the world’s athletes to meet next February,” Lumme said.

Lockheed Wins US Air Force Deal for Radar Threat Simulators

Lockheed Martin Corp said on Wednesday it had won a $104 million U.S. Air Force contract to develop, produce and field a threat simulator to train combat aircrews to recognize and deal with rapidly evolving threats, such as surface-to-air missiles.

Tim Cahill, vice president of air and missile defense systems for Lockheed, said a number of other countries had already expressed interest in the  Advanced Radar Threat System Variant 2, and talks could begin soon on possible sales.

Cahill did not estimate the volume of possible future sales, but potential buyers included all countries that plan to operate the stealthy F-35 fighter jet in coming years.

“It’s a cool little program,” he said. “This is just the first tranche, but it has the potential to be a really big program for us.”

“As the capabilities on the ground from potential threat nations get stronger and better and more capable … it’s very important that the pilots need to train against a system that is actually a high-fidelity simulation of what they would fly against in combat,” he said.

The contract calls for development and delivery of a production-ready system and options to produce up to 20 more. Cahill said the truck-mounted system would emit signals that simulated those of current and evolving advanced surface-to-air threats.