What is Caktus AI?

In recent years, artificial intelligence has become an integral part of our everyday lives, revolutionizing various sectors, including education. Caktus AI is a noteworthy player in this evolving landscape. It offers a personalized, AI-driven learning experience that helps students optimize their learning process, understand complex concepts, and enhance their overall academic performance. In this article, we will explore what Caktus AI is, its key features, how it works, and its potential impact on education.

Overview of Caktus AI​

Caktus AI is an artificial intelligence platform designed to cater to students and educators by offering various tools aimed at enhancing learning and teaching experiences. Its core objective is to provide personalized educational support using AI, which tailors the learning experience to the specific needs of each student. This platform covers a wide range of subjects, including mathematics, science, language arts, and more.

What sets Caktus AI apart from other platforms is its AI-driven approach. The system analyzes a student's learning style, identifies their strengths and weaknesses, and then customizes the learning material to fit their unique profile. This approach makes learning more engaging and effective.

Key Features of Caktus AI​

1. Personalized Learning

One of the primary features of Caktus AI is its ability to provide personalized learning experiences. By leveraging AI algorithms, Caktus adapts learning materials according to the student's needs. For instance, if a student struggles with a particular topic, the system can offer additional resources and explanations to aid understanding. Conversely, if a student excels in a specific area, the system can adjust to provide more challenging content, helping to maintain a steady pace of academic growth.

2. AI-Powered Tutoring

Caktus AI functions as a virtual tutor, offering explanations, examples, and practice questions tailored to individual students. This AI-powered tutoring system is available around the clock, enabling students to access help anytime they need it. It ensures that students can get answers to their queries promptly, without waiting for a teacher or tutor to be available.

3. Real-Time Feedback

Another critical feature of Caktus AI is the real-time feedback it provides to students. The platform analyzes students' work, identifies mistakes, and gives instant feedback on their progress. This immediate response helps students correct their errors and learn from them in real-time. The benefit of real-time feedback is that it allows students to stay on track and continuously improve their understanding of concepts.

4. Interactive Learning Tools

Caktus AI incorporates interactive tools such as quizzes, interactive exercises, and simulations to make learning more engaging. These tools are designed to enhance students' critical thinking skills while providing an immersive learning experience. Whether it’s solving complex math problems or understanding scientific phenomena, the interactive tools on Caktus AI offer students an opportunity to learn in a dynamic, hands-on way.

5. Performance Analytics

Caktus AI provides detailed analytics on students’ performance. This feature helps both students and educators track progress over time, identifying areas that require improvement. The analytics dashboard allows for a visual representation of the student’s growth, helping them stay motivated and on target with their learning objectives.

How Does Caktus AI Work?​

Caktus AI operates by using advanced machine learning algorithms to analyze a student’s interactions on the platform. The AI collects data such as response times, accuracy of answers, and topics that the student engages with the most. Based on this data, the AI creates a profile of the student's learning habits and performance.

Using this profile, Caktus AI customizes lesson plans, suggesting tailored resources, practice problems, and targeted exercises to improve areas where the student may be struggling. The system also continuously adapts to changes in the student's performance, ensuring that the learning experience remains both relevant and challenging.

For teachers, Caktus AI offers a platform where they can monitor their students' progress in real-time. Educators can use this data to provide additional support, modify lesson plans, and even predict future performance based on trends highlighted by the platform.

The Impact of Caktus AI on Education​

1. Enhanced Learning Efficiency

The personalized nature of Caktus AI allows students to focus on areas where they need the most improvement, thus increasing learning efficiency. Rather than following a one-size-fits-all curriculum, students can move at their own pace, ensuring that they grasp concepts fully before moving on to more advanced topics. This approach not only saves time but also ensures that learning is more effective.

2. Increased Student Engagement

The interactive and adaptive features of Caktus AI foster greater student engagement. Traditional classroom settings can sometimes struggle to keep students interested, especially if the pace of the class does not match their learning speed. Caktus AI addresses this issue by offering personalized, engaging content that keeps students motivated and invested in their education.

3. Scalability in Education

For educators, Caktus AI offers a scalable solution to personalized teaching. Teachers can monitor the progress of multiple students simultaneously without sacrificing the quality of individual attention. This scalability makes Caktus AI a valuable tool for classrooms with a large number of students, as it allows teachers to provide personalized support efficiently.

4. Bridging Educational Gaps

Caktus AI can help bridge the educational gaps that often arise due to varying levels of access to quality teaching. By offering on-demand, AI-driven tutoring, students from different backgrounds can access high-quality educational support, potentially reducing disparities in academic performance.

Conclusion​

Caktus AI is revolutionizing the way students learn and how educators deliver content. With its personalized learning experiences, AI-powered tutoring, real-time feedback, and interactive tools, it provides an innovative approach to education that caters to individual needs. The platform’s ability to adapt to students' strengths and weaknesses ensures that learning is both efficient and engaging. As AI continues to evolve, platforms like Caktus AI will likely play a pivotal role in shaping the future of education, offering scalable, accessible, and personalized learning for students around the world.

What Are Your Thoughts on the Privacy Risks of Microsoft's New Recall AI?

I've been diving into Microsoft's new AI feature, Recall AI, which is designed to help users remember important details and tasks by analyzing their communications and activities. While the technology sounds promising, especially for productivity, I'm concerned about the potential privacy implications.

Imagine an adversary gaining access to this AI. They could potentially exploit the system to collect sensitive data, track user behavior, or even manipulate the AI to retrieve confidential information. The more the AI learns about a user's habits, the more vulnerable that user could become to targeted attacks.

I'm curious to hear what others think. Could this be a significant privacy risk? How do you see this being leveraged by bad actors? Let's discuss the possible cybersecurity implications and share ideas on how we might protect against such threats.

North America MSP Seminar & Workshop for MSPs

The MSPAA is inviting MSPs to the MSP seminar & workshop event in the mile-high city of Denver, Colorado: Empowering the MSP Community: MSP Seminar for Growth
This event is designed to target the most troublesome issues in running a Managed Service (MSP) and work through options to find possible solutions. A complimentary hotel night is available for a limited number of registrations.

REGISTER

Featured Keynote Speakers:
  • Dr. Robert Beck - Chief Academic Officer / Fox Chase Cancer Research Center
  • Chris Johnson - Sr. Director Cybersecurity Compliance Programs / CompTIA
  • Rick Chapes - Business Center Vice President / AT&T
Workshop sessions hosted by subject matter experts in:
  • Operations
  • Marketing
  • Sales
  • Compliance
  • Employee performance
Social Events:
  • Evening Dinner at TopGolf
  • Keynote Dinner
  • $500 Cash Prize
LEARN MORE AND REGISTER

Attachments

  • TEBO Flyer 1.v2.png
    TEBO Flyer 1.v2.png
    717.1 KB · Views: 23

Agricultural Drones:6 Solutions to Common Problems

Hi everyone,

If you want to be a new drone operator, there some FAQs you may need to know . As a drone enthusiast, I would like to share some common questions here .

1)Can the remote controller install other apps?

The remote controller has completely open permissions, similar to smartphones ; there are no specific restriction for installation and uninstallation. It does not support QGC and the K3A temporarily.

2)Unable to connect FC ?

Check if matching the right remote controller. Check whether the baud rate matches the flight control.​

3)The remote controller is constantly beeping?

When the remote controller fails to connect to the receiver, it will keep beep as warning.​

4)The remote control broadcast volume is too low to hear clearly?

Find the volume options in the settings and adjust the volume to a suitable level.​

5)What other functions does the Type-C port have besides charging?


Besides charging, It can connect to the computer to view and transfer data files.

6)How many ways can the remote controller connect to the internet?

It can connect to the internet via a SIM card or through Wi-Fi .​



Any other questions about agricultural drone,leave your comments in the discussion.

图片2.jpg

Agricultural drones are really a good helper

Hey guys,have you ever seen or used an agricultural drone for spraying crops?

Lately i`ve been using an spraying drone to pesticide the rice,and i`ve got to say this tool really helped a lot.

Before I spray all rice field need 3-5 people , spent a lot of time to spraying the pesticides.

But with this smart agricultural drone, I can complete the 2hect fields spraying easily ,just within 1hour . Just mapping the fields and set the flight routes on remote, set the required dosage and speed, and it will work automatically. It returns automatically when out of medicine or power, just refill and replace quickly. I love it, especially in summer, as I can control remotely from the shade.

From the results, drone spraying saves 45% pesticide water than manual spraying, and the effect is also good. The most important thing is that it doesn't require as many people, making farming more easy and also can fertilize ,very useful.
Login to view embedded media
#agriculturaldrone #dronetech #sprayingdrone #forfarming #Thailand #rice #smartdrone #UAV

SaaS Choosing SaaS Providers: Essential Factors For SMBs To Consider

When shopping for services, small businesses and startups often focus first on cost, but that’s not the only important consideration when looking for a software-as-a-service (SaaS) vendor. The right technology tools can streamline processes and help SMBs better serve their customers—crucial factors in determining whether a business survives and thrives or goes down in defeat.

It’s vital to carefully vet SaaS vendors to not only get the maximum ROI on a critical investment but also to establish a long-term partnership that can support your growing business in the years ahead. Below, 20 members of Forbes Technology Council discuss essential factors an SMB should carefully consider when choosing a SaaS provider. Paying attention to these details ensures the technology tool you choose is the right fit for your unique organization.
  1. Platform Flexibility
    • Since every small business aims to reach the next level, I recommend asking potential vendors, “How flexible is your SaaS platform in terms of technology and customer support—can it adapt to our business as it grows?” Focus on scalability to handle growing operational needs, integration with existing tools, customization for changing requirements, and responsive support for quick issue resolution.
  2. Customer Support Systems
    • While costs cannot be overlooked, it’s essential to understand the kind of customer support one can expect from the vendor in question. Many SaaS vendors sit in the critical paths of their customers’ products, so it is crucial to know whether the vendor provides robust service-level agreements and a direct line to their technical staff when things go wrong.
  3. Long-Term Contracts
    • One essential question small businesses and startups should ask a potential SaaS vendor is, “What incentives and support do you offer for long-term contracts?” While SaaS can initially ease cash flow, over time, it could become more costly than on-premises solutions. Comprehensive environments and additional modules from one vendor can be more cost-effective.
  4. Vendor’s Security Architecture and Longevity
    • There are two essential issues here. The first is all about security, and it’s especially important for small companies. You need to understand whether a SaaS product is introducing vulnerabilities by thoroughly assessing the vendor’s security architecture and knowledge. The second issue is the vendor’s longevity. Very low pricing may be unsustainable; if they go out of business, you’re left vulnerable and without support.
  5. Vendor’s Company Culture
    • An essential question is whether the vendor is a fit for your company’s culture and whether they will be an extension of your team. Far too often, we focus on technical aspects when something far more simple—such as asking yourself, “Would I hire these people to work with on a daily basis?”—can make a massive difference.
  6. Whether (And How) The Tool Saves You Time
    • While cost is a key driver for a small business or startup that’s considering value, the larger consideration is, “How does this enable or empower my team or company to do more?” In a smaller company or startup, it’s the drain on the employees’, founders’, and/or management team’s time that is a growth constraint. By focusing on freeing up time through tools where possible, you will further drive your growth.
  7. How The Vendor Stacks Up To Competitors
    • Data integrity, service reliability, customer support, receptiveness to feedback, and continuous improvement are all important. When meeting with a prospective SaaS provider, ask, “Your SaaS competitor may come to me in a year with a better price proposition than yours. What can you say to me today that will persuade me to say ‘no’ to them?”
  8. Self-Service Capabilities and Support
    • For SaaS AI solutions, have questions about self-service capabilities. Can you fix, update, and maintain the solution with your own team? What kind of data and AI expertise would you need? Will the vendor provide education for your team?
Discussion Questions:
  1. What has been your experience with SaaS vendors in terms of platform flexibility and scalability?
  2. How important is customer support to you when choosing a SaaS provider, and what level of support do you expect?
  3. How do you assess the security architecture and longevity of a potential SaaS vendor?
  4. How important is it for a SaaS vendor to align with your company’s culture?
Read the article: https://www.forbes.com/sites/forbes...iders-essential-factors-for-smbs-to-consider/

A new class of artificial systems, artificial subjective systems.

AI technology, like any programmable system, has inherent limitations. It cannot comprehend the meaning of the information it receives and adapt to it. These limitations underscore the need for a new approach to artificial systems.
In addition, AI systems are subject to the danger of an information explosion, cannot be fully autonomous, require training on huge databases, and are created to find solutions to a specific range of problems.

I managed to find an approach to creating a new class of artificial systems that, like living organisms, will not be subject to the problems listed above and will be able to help authorized people solve problems inaccessible to programmable systems. Such issues are unfamiliar to living organisms precisely because they are subjective.

So, we, too, need to move from creating programmable systems to creating subjective ones.

Women in Technology 5 reasons women make top team-first collaborators in tech

Despite the underrepresentation of women in tech, particularly in CIO roles, women have demonstrated exceptional collaborative skills that can significantly enhance team-centric cultures. Here are five ways women can foster better collaboration within organizations:

  1. Driving Equality in Conversations:
    • Research indicates that groups with more women exhibit greater equality in conversational turn-taking. This inclusivity ensures that all members can contribute their skills and knowledge, leading to more effective teamwork.
  2. Encouraging Buy-In with the Organization’s Mission:
    • Female CIOs excel in balancing innovative solutions with business outcomes, especially in the AI era. Their strong influencing and communication skills help align new technologies with organizational values, inspiring greater buy-in from team members.
  3. Fostering Expectations of Fair Treatment:
    • The presence of female leaders often leads employees to expect fairer treatment, enhancing trust within the organization. This increased trust can have immediate positive impacts on collaboration and overall organizational health.
  4. Building Trust Biologically:
    • Women naturally release more oxytocin, a brain chemical that fosters trust and reduces anxiety. This biological advantage helps female leaders create more cooperative and collaborative environments, even in competitive or stressful situations.
  5. Adopting a Community-Oriented Approach:
    • Women tend to be more community-focused, which can lead to a more cooperative decision-making process. This approach uncovers new insights and ideas, driving better solutions and fostering a collaborative culture.
Discussion Questions:
  1. How can organizations leverage the collaborative strengths of female leaders to enhance team dynamics?
  2. What strategies can be implemented to ensure that the contributions of all team members are valued equally?
  3. How can female CIOs balance the demands of innovation and cybersecurity while fostering a collaborative environment?
  4. In what ways can organizations build trust among employees to improve collaboration and productivity?
  5. How can the community-oriented approach of female leaders be harnessed to drive better decision-making and problem-solving?
By recognizing and promoting the unique strengths that women bring to leadership roles, particularly in tech, organizations can create more inclusive, collaborative, and innovative environments.

Read the article: https://www.cio.com/article/3477870/5-reasons-women-make-top-team-first-collaborators-in-tech.html

Artificial Intelligence How To Utilize AI In Business And Still Cultivate Real Relationships

Artificial intelligence (AI) is deeply integrated into our daily lives, enhancing efficiency and productivity in various sectors. However, this technological advancement brings a paradox: while AI offers numerous conveniences, there is a growing desire for genuine human connection.

AI's ability to streamline processes and improve accuracy is undeniable. Yet, as AI systems become more advanced, concerns arise about the diminishing human element in business interactions. Humans are inherently social beings, and authentic interactions are crucial for building trust, loyalty, and a sense of belonging. In an AI-dominated world, these essential components can sometimes feel compromised.

Strategies for Balancing AI and Authenticity:
  1. Hybrid Approach: Combine AI's efficiency with human empathy. Use AI for routine tasks and data analysis, but ensure that real people handle complex or sensitive interactions, especially those involving customers.
  2. Personalized Interactions: Leverage AI to gather insights about customer preferences and tailor interactions accordingly. This approach makes customers feel understood and valued, fostering deeper connections.
  3. AI-Generated Content: While AI-generated content can be useful, it's essential to have proper review systems in place. Human engagement is crucial for authenticity, as people can often distinguish between AI-created and human-created content.
  4. Transparency: Be open about AI usage. Inform customers when they are interacting with a bot and provide easy access to human support. Establish clear AI policies for employees regarding when and how AI should be used.
As AI technology evolves, it has the potential to enhance authentic connections by better understanding and emulating human emotions. However, the current trend shows a strong desire for genuine human interaction in all aspects of life.

Ultimately, a brand or company's success hinges on its ability to connect with its target audience. While AI offers significant benefits, the key is to use it in moderation. Building trust and meaningful relationships with customers is best achieved through personal engagement. By prioritizing the human element in AI strategies, businesses can foster stronger, more authentic connections with their audience.

Discussion Question:

How can businesses effectively balance the efficiency of AI with the need for authentic human interactions?

Read the article: https://www.forbes.com/sites/forbes...iness-and-still-cultivate-real-relationships/

SaaS Adjusting Your Security Speed To Keep Pace With SaaS Risks

Many organizations are unprepared for the escalating threat of cybersecurity attacks and breaches, particularly in the context of Software as a Service (SaaS) applications. Despite the widespread adoption of SaaS for core business functions, there is a significant lack of awareness regarding the associated risks.

Recent research highlights that 96.7% of organizations experienced a security incident with at least one SaaS application in the past year. Additionally, 8,500 applications now incorporate generative AI (GenAI) capabilities, many of which can train on user data, posing further security concerns.

The slow adoption of SaaS security measures and impending regulatory changes could leave organizations vulnerable. Regulations such as NY-DFS in the U.S. and DORA in the EU mandate rapid reporting of security events in SaaS supply chains, underscoring the need for speed in cybersecurity responses.

Key Risks in SaaS Adoption:
  1. SaaS Invisibility: Unauthorized use of SaaS applications is widespread, with nearly half of these apps used by a single employee without oversight. Employees often accept terms and conditions without understanding the risks, potentially exposing sensitive company data to numerous SaaS providers.
  2. SaaS Security Responsibility: While securing SaaS configurations is crucial, the responsibility often falls on both the SaaS provider and the employees. Security teams must quickly identify and address incidents, ensuring compliance with regulations and maintaining security standards.
The Need for Speed in SaaS Security:

Manual processes for monitoring and protecting SaaS are inadequate. To meet the 72-hour notification requirement, security measures must be efficient and not overly dependent on human intervention. Best practices for SaaS security should include:
  • Speed in Supply Chain Change Detection: Regular checks are essential but not enough. Rapid changes in the SaaS supply chain necessitate immediate risk management processes.
  • Speed in Risk Assessment: With over 300,000 SaaS applications available, a streamlined security approach is needed to facilitate quick decision-making within business units.
In conclusion, organizations must enhance their SaaS security practices to address these challenges effectively and comply with regulatory requirements. How are you or your organization enhancing the SaaS security practices?

Read the article: https://www.forbes.com/sites/forbes...-security-speed-to-keep-pace-with-saas-risks/

Research: 4 Ways Employees Respond to DEI Initiatives

Diversity, equity, and inclusion (DEI) initiatives, such as diversity training, targeted recruiting, and dedicated diversity-focused leadership roles, aim to address inequities, create an inclusive environment, and increase representation of historically marginalized groups. Many organizations globally are investing significant resources into these efforts, often implementing them with a one-size-fits-all approach.

However, these initiatives frequently fall short of their intended outcomes and can even lead to unintended negative consequences. For instance, a policy designed to promote gender diversity in leadership roles might, if not carefully communicated, alienate male employees or expose female employees, fostering division rather than inclusiveness.

The Importance of Employee Responses​

A critical factor influencing the success of DEI initiatives is how employees respond to them. Traditionally, employee responses have been oversimplified into two categories: “resistors,” who hinder DEI initiatives, and “supporters,” who facilitate their implementation.

Recent research published in the Journal of Applied Psychology suggests that this binary view is inadequate. Instead, managers should recognize the nuances in employee responses. Employees often exhibit ambivalence, simultaneously supporting DEI goals while harboring skepticism or discomfort about specific policies or their communication. Labeling these individuals as “against” DEI initiatives oversimplifies their stance and misses opportunities for constructive engagement. Embracing the complexity of employee responses, including ambivalence, is crucial for effectively navigating DEI initiatives.

The Four Ways Employees Respond to DEI Initiatives​

Our research identified a typology of employee responses to DEI initiatives. We conducted three separate online studies with over 1,600 employees across various industries, companies, jobs, geographic areas within the U.S., and demographic groups. Participants had experienced a diversity initiative within their organizations in the last six months.

We sent multiple surveys to each participant, spaced a few weeks apart. The first survey asked participants to describe the diversity initiatives they had experienced, providing detailed insights. Subsequent surveys captured their responses to these initiatives, measuring their thoughts on benefits and required efforts, their feelings (ranging from excitement to sadness), and their behaviors (from active support to active resistance).

Using latent profile analysis, we identified meaningful patterns in participants’ responses, uncovering typical response profiles. We ensured the robustness of these profiles by replicating them in follow-up studies and exploring factors that predict which profile a person will be assigned to, such as personal beliefs.

Key Takeaways for Managers​

  1. Recognize Ambivalence: Understand that employees can simultaneously support DEI goals and feel skeptical about specific policies. Engage with these nuanced responses constructively.
  2. Tailor Communication: Carefully communicate DEI policies to avoid alienating any group. Clear, inclusive communication can prevent misunderstandings and foster a more supportive environment.
  3. Engage Constructively: Instead of labeling employees as “for” or “against” DEI initiatives, engage with their concerns and suggestions. This approach can turn potential resistance into constructive feedback.
  4. Holistic Approach: Consider the broader context of employees’ thoughts, feelings, and behaviors. A holistic understanding of their responses can inform more effective DEI strategies.
By embracing the complexity of employee responses and tailoring DEI initiatives accordingly, organizations can create a more inclusive and supportive environment, ultimately achieving their DEI goals more effectively.

Read the article: https://hbr.org/2024/07/research-4-ways-employees-respond-to-dei-initiatives

Cybersecurity The Future Of The Cybersecurity Profession With The Rise Of AI

Artificial intelligence (AI) is revolutionizing industries from healthcare to manufacturing to agriculture, and cybersecurity is no exception. As AI reshapes possibilities across various sectors, it is also steering the cybersecurity profession in a bold, new direction. This AI-driven transformation will not only alter the daily activities of cybersecurity practitioners but also necessitate new roles and skill sets within the profession.

The Cybersecurity Profession Today​

Globally, several jurisdictions are proactively addressing the expanding skills gap in cybersecurity. They are defining the profession to guide government, industry, and academia in a structured manner.

In the U.S., the Workforce Framework for Cybersecurity (NICE Framework) spans public, private, and academic sectors. It defines seven high-level cybersecurity functions linked to 33 specialty areas and 52 work roles, detailing specific knowledge, skills, and abilities. These functions range from cybersecurity governance to design and development, threat management, operations, analysis, and investigation.

Similarly, the European Cybersecurity Skills Framework (ECSF) outlines 12 cybersecurity professional role profiles, detailing their titles, missions, tasks, skills, knowledge, and competencies. These roles vary from managerial to legal, operational, assurance, and risk management.

In the U.K., the Cyber Security Council defines 16 specialisms in cybersecurity, from managerial to technical. These governmental skills frameworks are mapped to credentials offered by cybersecurity associations, guiding professionals in enhancing their skill sets.

These initiatives are crucial as the cybersecurity profession evolves. The rapid adoption of AI and other emerging technologies, coupled with the creation of larger digital ecosystems and increased sophistication of cyber threats, underscores the need for a holistic set of skills per function. Cybersecurity expertise is essential, but viewing cybersecurity in isolation contributes to many of the failures observed today.

Cybersecurity professionals must understand the business context of the ecosystems they protect to apply or embed cybersecurity effectively. They also need to grasp adjacent domains like audit, privacy, risk, and digital technology governance to ensure cybersecurity aligns with the needs of these domains and is not siloed.

Moreover, understanding emerging technologies like AI is vital. One cannot protect what they do not understand—whether identifying risks, building controls, or conducting forensics and investigations in AI-embedded ecosystems.

Changes Coming to the Cybersecurity Profession​

AI is set to continue transforming the cybersecurity profession in the coming years, but the AI-shaped reality has already arrived.

As highlighted in our whitepaper, "The Promise and Peril of the AI Revolution," AI enables a more sophisticated world of cybercrime. Bad actors are using AI to write malware faster, generate hacking scripts, launch ransomware attacks, and convincingly imitate CEO voices. Concurrently, threats against AI are rising, from algorithm manipulation attacks to privacy breaches.

In this context, the cybersecurity profession will become exponentially more important. But what will it look like?

AI offers unparalleled capabilities to identify threats and patterns, automate real-time responses, swiftly process entire datasets, and accelerate decision-making. This transformation will demand cybersecurity professionals to adapt and evolve, integrating AI knowledge and skills into their repertoire to stay ahead of emerging threats.

The future of cybersecurity is intertwined with AI, and professionals must be prepared to navigate this new landscape. By embracing AI and expanding their skill sets, cybersecurity practitioners can ensure they remain relevant and effective in protecting our increasingly digital world.

Read the article: https://www.forbes.com/sites/forbes...cybersecurity-profession-with-the-rise-of-ai/

Internet of Things (IoT) Securing the modern world of IoT

The Internet of Things (IoT) has seamlessly integrated into our daily lives, from the wireless ATMs of the 1990s to today's smart traffic management solutions. The convenience and efficiency brought by connected devices are undeniable. However, as IoT usage has surged, so have concerns and incidences of cyber-security attacks and vulnerabilities.

Cyber-Security Vulnerabilities in IoT

IoT devices are prime targets for attackers seeking access to corporate networks and personal data. Many devices lack default encryption, creating significant vulnerabilities. Sensitive information can be exposed, taken, and manipulated as it is transmitted between devices. Additionally, unsecured interfaces and a lack of physical security measures make IoT devices susceptible to malware injection and other cyber-attacks.

Distributed denial-of-service (DDoS) attacks can leverage botnets to overwhelm and disrupt unsecure IoT devices. Physical or identity theft can grant attackers access to compromised systems, while unpatched security vulnerabilities in firmware and software present additional opportunities for attack. Hackers exploit these vulnerabilities to disrupt operations, gain unauthorized access, and even launch ransomware attacks—a growing threat, especially for critical industrial and infrastructure systems.

In 2023, research found a 400% increase in IoT and OT malware attacks year-over-year, highlighting the rapid escalation of these threats.

Challenges in Addressing IoT Security

One reason this issue persists is that manufacturers prioritize affordability and streamlined user experiences over robust security features. This has created a breeding ground for vulnerabilities that attackers can easily exploit.

Patch management is another significant challenge. Maintaining the security and functionality of networked devices requires regular updates, but the diverse range of IoT devices complicates this task. Each product may require a unique patch, making it difficult for administrators to track and apply numerous updates across vast networks. Unpatched vulnerabilities can be exploited by malicious actors, leading to security breaches, data theft, and compromised networks.

Enhancing IoT Security

Despite these challenges, there are effective methods and technologies to enhance IoT security.

AI and Real-Time Threat Detection

Artificial intelligence (AI) and machine learning (AI-ML) are increasingly important for real-time threat detection and response (TDR). By analyzing vast quantities of data at speed, AI can identify trends, abnormalities, and possible security breaches. AI-driven security solutions for IoT networks can monitor and control connected devices, speeding up threat identification and mitigation. However, AI tools should not be relied upon solely.

Zero Trust Strategy

Implementing a comprehensive Zero-Trust strategy is crucial. This strategy secures an organization by removing implicit trust and requiring validation at each stage of a digital interaction. Blockchain, built on Zero-Trust principles, offers significant security potential for the IoT market. It enables coordination between devices, tracks these devices, and processes transactions efficiently.

A well-designed Zero Trust strategy should consider all IoT devices and internet-connected systems across a business and clearly delineate responsibilities for managing these technologies.

Conclusion

While IoT brings immense benefits, it also presents significant cyber-security challenges. By leveraging AI for real-time threat detection and implementing a comprehensive Zero Trust strategy, organizations can enhance the security of their IoT networks and devices, mitigating the risks and harnessing the full potential of IoT technology.

Read the article: https://www.business-reporter.co.uk/improving-business-performance/securing-the-modern-world-of-iot

Widespread Azure Outage Impacting CompTIA Websites

Just an FYI there is a significant Azure outage that is impacting CompTIA and many other websites and services. We have posted communications on social media, as per the picture below. This is impacting the ChannelCon site, which includes registration. Azure failover protocols are not working as designed. Microsoft is actively working on this and we are monitoring events in real-time and have all necessary hands on deck. We apologize for any inconvenience, and thank you for your patience.
1721353609886

Cybersecurity The Future Of Cybersecurity: Emerging Threats And How To Combat Them

Read Word
The Evolving Landscape of Cybersecurity: Emerging Threats and Best Practices
Cybersecurity is now a major concern for everyone—from businesses and governments to everyday individuals. While the rapid pace of technology brings exciting new possibilities, it also opens the door to more sophisticated cyber threats. Recent high-profile cyberattacks, such as the Ascension attack and the French State DDoS attack, have demonstrated the devastating impact these threats can have.

Emerging Cyber Threats​

The world of cybersecurity is always evolving, with cybercriminals constantly finding new and more persistent ways to exploit vulnerabilities. According to Cybersecurity Ventures, global cybercrime damages are predicted to reach $10.5 trillion annually by 2025, underscoring the urgency for robust cybersecurity measures.

One significant evolution is seen in ransomware attacks, which have moved beyond simply encrypting data and demanding a ransom. Modern ransomware involves data exfiltration and threats of public disclosure, disrupting business operations and damaging reputations.

In May, the Russia-linked Black Basta group targeted Ascension, the largest non-profit Catholic health system in the U.S. The attack disrupted clinical operations across Ascension's 140 hospitals, leading to a loss of access to electronic health records (EHR). This disruption significantly affected patient care, forcing the company to pause some non-emergency elective procedures at its hospitals.

In addition to ransomware, another critical area of concern is supply chain attacks. These attacks target vulnerabilities within the supply chain network, often through third-party vendors, highlighting the importance of securing the entire supply chain.
Furthermore, cybercriminals are increasingly using AI to enhance their attack methods. Consider the following examples of AI-powered attacks taking over the headlines:
  • DeepLocker: A proof-of-concept AI-powered malware developed by IBM researchers, remaining hidden until it reaches a specific target.
  • Deepfake scams: Earlier this year, cybercriminals used AI to impersonate a company executive, convincing an employee to transfer a substantial amount of money.
AI-driven malware can adapt to avoid detection, and AI is used to create deepfakes for sophisticated social engineering attacks.
Distributed denial-of-service (DDoS) attacks also pose significant threats by overwhelming a target's network or website with a flood of internet traffic, rendering it unusable.

In March 2024, over 300 web domains and 177,000 IP addresses associated with the French government were targeted in a massive DDoS attack. The attack, claimed by Anonymous Sudan and suspected to be sympathetic to Russia, caused severe disruptions to major public service websites.

Best Practices For Building a Robust Cybersecurity Infrastructure​

Building a robust cybersecurity infrastructure is essential to combating these evolving threats. Adopting a zero-trust model ensures that every access request is verified, regardless of its origin. Key components include multi-factor authentication (MFA), least privilege access, and network segmentation.

Additionally, advanced monitoring tools are essential for detecting and responding to cyber threats in real time. Security information and event management (SIEM) systems and AI-driven analytics provide comprehensive visibility into network activities and alert security teams to potential threats.

Equally important is addressing human factors in cybersecurity. Employee training and awareness are crucial, as human error remains a significant vulnerability. Regular training programs can equip employees with the knowledge to recognize and respond to potential threats, such as phishing attacks, thereby creating a culture of security awareness and combatting successful attacks.

The Role Of AI In Cybersecurity Defense​

While artificial intelligence (AI) has enabled cybercriminals to expand their capabilities, it has also emerged as a powerful tool in the fight against cyber threats. AI's capabilities in threat detection and response have revolutionized cybersecurity defense strategies. By leveraging machine learning algorithms, AI can analyze vast amounts of data to identify patterns and anomalies that may indicate a cyber threat.

AI-driven cybersecurity solutions can automate threat detection and response, reducing the time it takes to mitigate attacks. This proactive approach allows organizations to avoid cybercriminals and protect their critical assets.

Join the Discussion​

As we navigate the complexities of the digital age, it's crucial to stay informed and proactive about cybersecurity. What are your thoughts on the emerging cyber threats and the role of AI in cybersecurity defense? Have you implemented any of the best practices mentioned above in your organization? Share your experiences and insights in the comments below. Let's work together to build a safer digital world!

Read the article: https://www.forbes.com/sites/forbes...rity-emerging-threats-and-how-to-combat-them/

Women in Technology How Female Entrepreneurs Are Using Technology To Solve Real-World Problems

The state of entrepreneurship in the U.S. is robust, particularly for women. According to the 2024 Wells Fargo Impact of Women-Owned Business Report, women have been opening businesses at nearly twice the rate of men and now represent 39.1% of small business owners. This remarkable growth sees women venturing into diverse industries, including financial, real estate, and technical services.

Across these sectors, female entrepreneurs are harnessing the power of technology to create solutions to real-world problems, driving lasting change. Their unique perspectives and experiences are leading to the development of innovative business models and brands that are fundamentally reshaping their industries.

The Rise of Women in Tech

According to Deloitte, the tech industry has seen a significant increase in female leaders, with women now representing 33% of the tech workforce. However, women don't need to be classified as working in "tech" to benefit from technology when starting their own businesses. They are making significant strides in the broader tech industry, developing innovative products and services that enhance various aspects of daily life. By focusing on user-centered design, they create solutions that improve quality of life and drive economic growth.

“Tech has opened up so many opportunities for entrepreneurs looking to solve problems that they see happening among their community, including with their friends, family members, and peer groups,” says Paula Panagouleas Miller, founder of the app Karmascore. Her app helps people measure key aspects of their personal and professional relationships, a feat made possible by technological tools that generate, analyze, and summarize data.

The Power of Data in Problem Solving

Data is a powerful tool in business, and technology enhances its utility. “I’ve found that documentation is vital for our users, as it allows them to track the ins and outs of their relationships. This allows people to take stock of their interpersonal interactions and make better decisions about who to prioritize their time with,” says Miller. Such documentation and tracking would not be possible without advanced technology.

Improving access to key data points will lead to additional applications as more entrepreneurs find ways to use data for practical purposes. “Because there's only going to be more data in the future, there will just be more and more applications everywhere,” says Professor Mark N. Broadie from Columbia Business School. These applications can cross industries and help people in every aspect of their personal and professional lives.

Overcoming Challenges

While female entrepreneurs are making remarkable contributions across various sectors, they often face significant challenges. “Technology can help break barriers women face, including accessing funding, facing gender bias, and experiencing limited representation in industry,” says Miller. “For many businesses and applications, tech breaks down some of those barriers by increasing accessibility and helping entrepreneurs do more with fewer resources.”

The Impact of Women Using Tech in Entrepreneurship

The impact of female entrepreneurs using technology extends beyond their individual ventures. “Women entrepreneurs who use tech are addressing real-world problems people in their communities and around the world face every day in unique and innovative ways. Moreover, their success serves as an inspiration for future generations of women, encouraging more young girls to pursue careers in technology and entrepreneurship. As the tech industry becomes more inclusive and diverse, the potential for groundbreaking innovations and positive change will only continue to grow,” says Miller.

Let's celebrate and support the women who are transforming the entrepreneurial landscape with technology. Their stories and successes are paving the way for a brighter, more inclusive future in tech and beyond. How can we further support and amplify the voices of women in tech entrepreneurship? Share your thoughts and join the conversation!

Read the article: https://www.forbes.com/sites/jiawer...sing-technology-to-solve-real-world-problems/

Web3 Three Reasons Why Your Business Should Switch To Web3

Web 2.0 was the version of the internet that unlocked a virtual world of social interaction and collaboration on the Web. For the first time, the internet went beyond basic, static HTML pages to dynamic websites with user-generated content (UGC). Then, search engines and social media applications like Google, Facebook, YouTube, Instagram, and more emerged, and users could interact and share photos and videos with their friends, co-workers, and family members.

However, as Web 2.0 became increasingly successful, new patterns began to evolve. The internet became increasingly centralized, consolidating digital power in the hands of a few large companies. Pages were censored, cybersecurity attacks skyrocketed, and some corporations began to sell user data to advertisers for monetary gains. Providers could kick websites deemed not to conform with their policies off the internet or restrict them from appearing in Web results. In many cases, tech giants became both judge and jury.

When Google—one of the most successful tech corporations and search engines—dumped its "Don't be evil" motto, it was clear that the internet needed to become independent once again.

Welcome To Web3

Web3 represents a new phase of the internet that emphasizes decentralization, privacy, security, and personalized experiences. It integrates technologies like blockchain and cryptocurrency to create a decentralized network that isn't controlled by a few tech giants but rather "by the people, for the people."

Whether you're a business owner, creator, developer looking to build scalable products, or average internet user, here are the top three reasons why you should consider switching over to Web3:

  1. More User Control: One of the primary advantages Web3 offers is restoring users' data rights. On Web 2.0 platforms, although users can freely share content, they don't retain any rights over data shared on these platforms. In a classic example of "If you're not paying for the product, you are the product," many Web 2.0 social media platforms actively encourage users to share data like personal information, preferences, and more in return for the free use of the platform. This information and other data, such as buying patterns and website visits, are tracked, recorded, and then sold to advertising companies, which use it to create targeted ads. In contrast, on Web3 platforms, the user remains the rightful owner of any data and information shared. Users also have control over what portion of data they want to share with advertising companies and can even directly profit from the monetization process. The inherent blockchain features also allow users to create decentralized identities that aren't dependent on centralized authorities—an approach that provides greater flexibility and control.

  2. Security And Cross-Border Payments: Web3 offers a security architecture backed up by the integrity of the blockchain—a distributed system with multiple failsafes. For business owners, this provides a double-fold advantage. First, the Web3 decentralized system makes applications very resilient to failures. This is due to a redundancy system that ensures that even when one node (server) goes down, several other nodes in the network will automatically compensate and keep the application running.

  3. An Incentive-Based System: Web3 advocates a system where all participants rather than a few centralized entities win. Take NFTs (non-fungible tokens) for an example. Although trading monkey pictures may no longer be the fastest way to make thousands of dollars, the technology behind the system is still solid. NFTs present a way to directly reward creators for their artistic contributions without losing a portion of their profits to centralized middlemen.
Join the discussion and share your thoughts on transitioning from Web 2.0 to Web3. How do you think Web3 will shape the future of the internet?

Read the article: https://www.forbes.com/sites/forbes...sons-why-your-business-should-switch-to-web3/

Cybersecurity Interest Group: Leveraging AI in Cybersecurity

Join the CompTIA Community Cybersecurity Interest Group as we discuss how AI is influencing the cybersecurity industry. We’ll be discussing the difference between the AI powering your security solutions and the Generative AI boom we’re seeing today, as well as some best practices when it comes to acceptable use in AI and keeping you and your customers’ data safe.

The session is taking place Monday 15 July 3.30-4.30pm BST 4.30-5.30pm CET

Register here: https://connect.comptia.org/events/registration?eventid=IG715

UK & Ireland UK& Ireland Community Meeting & Spotlight Awards

Have a look at the full day's presentations, and resources from speakers and CompTIA, your trade association. Here to help you in your business.

Community Meeting: Regional Group Meeting and Spotlight Awards – summary:
•58% of businesses say they’re in better shape today than two years ago.
•Automation is on the increase.
•Cyber Security is still very high on the agenda.
•Disaster recovery is one of the few services MSPs are being asked for.

Adam Pilton from CyberSmart, took us on a storytelling journey about how we continuously leak so much data!

James Doherty from Indigo Mentoring explained why mentoring is important before handing over the stage to Lizzie Robinson & Paul Croker. They engaged the audience with questions such as “What keeps us awake at night?” and “Who do we attract prospects to engage and talk to with us?”

Just before the half-time whistle, Andrew Allen delivered a sneak peek into CompTIA's new mentoring program, including the mentorship handbook and guide. 12 people signed up on the spot 🎉

After lunch, Ian Groves took us through some of the resources available within the CompTIA portal that can be used as a guideline or framework for MSPs, whether you’re a start-up or an existing business looking to fine-tune operations.

Are you in the news? Carl Jones delved into this topic and split out all how PR people will engage with you and help promote that story. First, you need to understand who your PR contact is and how they’d like the information delivered to them. If you make it difficult, they’ll not engage.

Self-Sabotage: This was a hot topic, and we’re all guilty of it somehow. Teresa Heath-Wareing took to the stage and immediately engaged the audience. It was an excellent keynote that I’ll remember for a long time!

Dash to our hotel; changed and back from Spotlight Awards.

Congrats to:
•Future Leader: Claire Jenks
•Advancing Women in Tech: Georgia Howlett
•Community Leadership: Dan Scott
•Cybersecurity Leadership: Mostyn Thomas
•Advancing Diversity in Tech: inSOC
•Solution Provider: Start Tech
•Innovation Vendor (tie): Salesbuildr & Sophos
•Innovation Distributor: Pax8
•Associate Member (tie): ITbetweeners & Network Group

**Credit to @Robert Gibbons, Chief Revenue Officer at Aabyss Ltd for the above summary.

Attachments

  • Birmingham Meeting Deck 26 June 24_Share.pdf
    35.7 MB · Views: 87

Important Agricultural Drone Motors Maintenance Tips

As a crucial component of multi-rotor drones, the motor system has strict reuiqrements on horizontal accuracy. Even minor installation errors or loose parts can affect flight stability. Therefore, regular pre-flight calibration is essential to ensure stable flights and prevent potential serious failures.

01.jpg

Two key parts for motor system maintenance:

Ⅰ, Inspection and cleaning of propellers and clamps .

  • Check whether the propeller blades are deformed, cracked, or have any damage such as notches on the edges; check whether the propeller clips are cracked or the screws are loose. If there is any damage, please replace it in time.
  • Clean the blades and clips.
图片1.png

Ⅱ,Checking level and adjust the motors

  • Check whether there is deformation, damage or objects attached on the motor. If so, clean or replace it immediately.​
  • First, place the level on the GPS mount and adjust the drone body to ensure the bubble is centered on the level in both the Y-axis and X-axis directions, as shown in the picture (Note: Don’t flip the level, and ensure the bubble is centered and not touch the scale lines).​
02.jpg
03.jpg

  • Then, place the level horizontally on the M1, M2, M3, and M4 motors, and adjust the motor to ensure the bubble is in the center of the level. (Note: The bubble must be centered ).​
1719803276818.png

Proper pre-flight motors checking and regular maintenance significantly reduce failure rates and extend the drone's lifespan, ensuring the safety of your flights. Choose an efficient, safe agricultural drone to make your work easier.

412905053_122116610432068831_2371002462975907111_n.jpg

Attachments

  • 08.jpg
    08.jpg
    495.7 KB · Views: 690

SaaS How SaaS Companies Can Prepare For Embedded Finance

Software as a Service (SaaS) has become the backbone of modern business operations, with its value reaching approximately $195 billion last year. However, the competitive landscape, evolving business models, and shifting user expectations post-pandemic have introduced significant challenges for SaaS providers. These include soaring acquisition costs and shrinking return on investment, making new revenue streams essential for enhancing customer retention strategies.

The Role of Embedded Finance

Embedded finance offers innovative solutions to these challenges by integrating banking and payment capabilities into nonfinancial ecosystems. For instance, purchasing insurance when booking a holiday or applying for a bank account through expense management software are examples of embedded finance. This integration aims to generate revenue and increase the value of existing products.

Why SaaS Companies are Embracing Embedded Finance

  1. Deepening Customer Relationships:
    • Embedded finance provides financial services such as bank accounts, payments, and lending, which help SaaS providers deepen their relationships with customers. These value-added services can reduce price competition and maximize the return on customer acquisition investment.
    • By analyzing financial data generated through embedded finance tools, SaaS providers can gain valuable insights into customer behavior and preferences, enabling them to tailor their offerings more effectively.
  2. Unlocking New Revenue Streams:
    • Embedded finance allows SaaS providers to diversify their income streams and enhance revenue. For example, Shopify reported a threefold increase in revenue from merchant solutions, which include financial products and fulfillment services.
    • By partnering with regulated fintechs, SaaS providers can tap into transaction fees, interchange revenue, and premium financial service offerings. Experimentation with various financial services and business models can unearth opportunities for scaling and differentiation.
  3. Empowering Customers:
    • Integrated financial services offer tangible tools that enhance customers’ competitiveness, such as automated expense management and real-time financial insights.
    • Embedded finance fosters financial literacy and responsibility among users, strengthening the provider-customer relationship and contributing to the long-term success and stability of businesses.
Conclusion

As SaaS providers navigate the challenges of a competitive and evolving market, embedded finance presents a promising avenue for growth and customer retention. By integrating financial services into their platforms, SaaS companies can deepen customer relationships, unlock new revenue streams, and empower their customers with valuable financial tools.

Discussion Questions:
  1. How do you think embedded finance will evolve in the SaaS industry over the next few years?
  2. What potential challenges do you foresee for SaaS companies integrating embedded finance into their platforms?
  3. Can you think of any other industries that could benefit from embedded finance? How?
Feel free to share your thoughts and insights!

Read the article: https://www.forbes.com/sites/forbes...s-companies-can-prepare-for-embedded-finance/

Women in Technology Let’s celebrate International Women in Engineering Day

International Women in Engineering Day (INWED) is a significant event that highlights the achievements and contributions of women in the engineering sector. This day, which has gained international recognition, originates in a UK-based campaign initiated by the Women’s Engineering Society (WES) in 2014. By 2016, the campaign received UNESCO patronage; the following year, it was celebrated globally.

The Women’s Engineering Society has a rich history. It was founded in 1919 in the UK. During the First World War, many women were employed in technical fields. However, post-war societal norms and legal changes made it challenging for these women to continue their engineering careers. This led to the establishment of WES by pioneering women who were determined to create opportunities for women in engineering. As the International Women in Engineering website noted, "A change in the law to return women engineers to the home just as their sisters were admitted into the civil service and legal professions led to the establishment of WES by pioneering and influential women."

While there has been progress since the early days of WES, the pace of change remains slow. The Society of Women Engineers, an American professional organization, reports an increase in women in STEM fields in the United States. However, this increase is not uniform across all fields. Engineering, in particular, lags behind life sciences, such as biological sciences, where gender parity has been achieved. Furthermore, the representation of Black and Asian women in engineering fields is notably lower.

As we celebrate International Women in Engineering Day, we must recognize both the progress made and the remaining challenges. This day reminds us of the importance of supporting and encouraging women in engineering and STEM fields, ensuring diversity and inclusion in these critical areas of innovation and development.

Read the article: https://www.givelively.org/updates/lets-celebrate-international-women-in-engineering-day

Artificial Intelligence Understanding The Hype Around GenAI: Marketing Edition

Artificial intelligence (AI) is officially transitioning from niche to trend to mainstream, with most businesses accepting—even embracing—its usefulness to improve operational efficiencies. Now, the next generation of AI is already here: generative AI, or GenAI.

Unlike traditional AI, which is trained to analyze data and make predictions within preset parameters, GenAI is further capable of creating entirely new data in all types of formats (text, images, music, videos, and more). Where traditional AI lets you ask Alexa to play your favorite hip-hop song, GenAI can re-create that song with the same lyrics but to the tune of, let’s say, Beethoven’s greatest symphony.

While that’s an amusing application of GenAI for entertainment, GenAI also has the potential to impact millions of people around the world by enhancing the one thing that supports our day-to-day lives: energy.

From AI To GenAI In The Energy Industry

Since it takes years of data collection and training to fuel GenAI, it’s important to first look at what traditional AI is doing in the energy industry today. Similar to other industries, AI has a foothold in customer-facing interactions like customer service chatbots. AI’s greatest impact, however, arguably has been helping utilities realize the full benefits of smart meters.

With nearly 120 million smart meters deployed across the U.S., smart meters make up a distributed network of intelligence already connected to the grid—and provide a treasure trove of data for AI to analyze and learn from.

Through smart meters, AI introduced the ability to disaggregate consumption data, which allows utilities to analyze data at the individual home level (and even appliance level) rather than at the standard neighborhood level. Utilities, as a result, are turning smart meter data into powerful insights that drive key initiatives—particularly load forecasting and grid planning, fuel switching and appliance upgrade programs, and theft detection.

Like most AI integration across industries, this new capability was originally a nice-to-have function. Now it’s essential and in nearly every new data analytics request for proposal (RFP).

‘Bolt-On’ To ‘Built-In’

Currently, AI is being layered onto data once it’s extracted from the smart meter (hence “bolt-on”). Now, some progressive meter companies are offering AI analytics features built into the meter itself.

Aside from the obvious benefit of not requiring customers to participate in surveys or install monitoring hardware, utilities gain AI-powered insights in much more real-time. This could include, for example, inside-the-meter monitoring of rooftop solar generation across the grid for a real-time view of supply versus demand.


What are your thoughts on the transition from traditional AI to GenAI in the energy sector? How do you think this evolution will shape the future of energy management and consumption? Let's discuss!

Read the article: https://www.forbes.com/sites/forbes...ding-the-hype-around-genai-marketing-edition/

Interest Group call recording: I've got anti-virus, I'm all sorted!" Are you aware of your liability as a Director?

Hi everyone,

If you missed today's Interest group call, we recorded the discussion and encourage you to listen to it. If you're a director of a Solution Provider or MSP company, it's definitely a discussion worth tuning into.

Here's the link:
https://comptia.zoom.us/rec/share/9...GWjGk0mN6gCdBJuSWJS33H564ZSZ.NdWDokjSaYsVH4I_

No passcode required.

Rose

Filter