Friday, January 26, 2018

Five Alexa tricks to build better, more interactive skills

TechTarget
Latest Technology News & Expert Advice     January 26, 2018
TechTarget
Issue Highlights:
Five Alexa tricks to build better, more interactive skills
Building a secure operating system with Roger R. Schell
How does the Stack Clash vulnerability target Unix-based OSes?
Thor's OS Xodus
Gemalto Sentinel flaws could lead to ICS attacks
Five Alexa tricks to build better, more interactive skills
Amazon Echo allows businesses to connect with consumers via Alexa skills, but voice interactions come with different challenges than standard graphical user interfaces.
Building a secure operating system with Roger R. Schell
The 'father' of the Orange Book has first-hand knowledge of the standards required for classified computer systems and the issues with subversion.
How does the Stack Clash vulnerability target Unix-based OSes?
A privilege escalation vulnerability known as Stack Clash affects Unix-based OSes. Expert Michael Cobb explains the flaw and how to protect systems from being exploited.
Thor's OS Xodus
In this excerpt from chapter one of Thor's OS Xodus, author Timothy "Thor" Mullen discusses OS X, privacy, and online safety.
Gemalto Sentinel flaws could lead to ICS attacks
Security researchers found 14 vulnerabilities in Gemalto Sentinel hardware tokens, which could allow dangerous ICS attacks, including full-system takeover.
This newsletter is published by TechTarget.

TechTarget Member Services, 275 Grove Street, Newton, MA 02466.
Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved. Designated trademarks and brands are the property of their respective owners.

When you access content from this newsletter, your information may be shared with the sponsors or future sponsors of that content as described in our Privacy Policy.

Privacy Policy | Unsubscribe
TechTarget

No comments: