hit a vaunted trillion-dollar valuation. Over that time, Apple released the Macintosh, the iMac, the iPod and then the iPhone.
It has taken just two years for Apple to repeat the feat. On Wednesday, the company’s market value surpassed $2 trillion for the first time, climbing to a record high before falling back slightly below the threshold.
In the time it has taken Apple to go from one to two trillion dollars, the company has released no major new products. Its biggest initiatives have been a US-only credit card, an internet TV service that has been met with mixed reviews, and a £5-a-month gaming service.
In the three months to the end of June, Apple’s sales were just 12pc higher than two years earlier. Profits have actually fallen, from $13.3bn (£10.2bn) to $13.1bn. This year, the global economy is due to contract heavily, and millions have become unemployed.
These do not seem like conditions in which a company would double in value, but an unprecedented combination of events - many of them outside Apple’s own control - has made it the world’s most valuable company.Apple: two years to $2tn
…
the milestones reached in the last year alone have been exceptional.
DeepMind, the British AI company owned by Google, has defeated the world champion at Go, the ancient game that requires a finely-tuned sense of intuition to master. Driverless cars now seem like an inevitability rather than a curiosity. Error rates on image recognition technology have dropped from 25pc in 2011 to less than 4pc.
AI is graduating from theory and academic papers to everyday life. If the last 10 years has been defined by the plummeting costs of microprocessors and sensors that have made smartphones a commodity product, the future is about building intelligent systems that can make them more powerful.
Ergo, the companies that will profit might not be the ones with expertise in hardware design, but those who can build software that talks back.
The missing name here is Apple. The undisputed victor of the smartphone-building wars, in profit and influence if not quite in market share, Apple’s expertise when it comes to AI is less clear.
…
yip Erdogan had previously voiced concerns over the nations' alleged support of the Kurdistan Workers' Party, or PKK, which Ankara considers terrorists. However, both Finland and Sweden committed in writing not to provide support to the group, and would work together on extraditions, terrorist financing and related issues.... and I would suggest SEEKING [ALPHA] in[DEED]
…
Project - THAT the archives of the BBC were worth more to the British nation than all the country's coal deposits and that in order to "mine" this wealth, an appropriate industrial infrastructure and facilities would have to be established - before the information could be put into IT (Information Technology) and subsequently distributed in a form which would be useful to ALL potential users.In the [GREENWICH]meanTIME, information technology has transmuted into a system which has the very capability of establishing "The WORLD GAME" policemen in a position of TOTAL Control of Spaceship Earth let alone the USA; and ALL at the behest of Big Business and Wall Street, with a plan to exclude every potential competitor, BRICS and all, in a USA/EU Trade[block], at the expense of the wishes of the people, who don't even understand that it is happening under their feet and before their very eyes !!!
Deception technology is a category of security tools and techniques that is designed to prevent an attacker who has already entered the network from doing damage. The technology uses decoys to misdirect the attacker and delay or prevent him from going deeper into the network and reaching his intended target.
Deception technology products work by distributing deception decoys that mimic genuine IT assets throughout the network. The decoys run either a real or emulated operating system (OS) and provide services that are designed to trick the attacker into thinking he has found a way to steal credentials or escalate privileges.Deception technology is intended to enhance rather than replace the other security products an organization uses. Because deception technology is designed to detect inside-the-network threats - e.g. IN THE DEMOCRATIC CAMPAIGN - and their lateral movement, alerts are always event-driven and automatically supported by forensics that can be analyzed with other log data from the organization's SIEM system should the need arise. Should even more information be required during an attack, some advanced deception systems can even open communications with the attacker's command and control (C&C) server to learn more about the attacker's methods and the tools he is using.…