The Rise in Virtual Assistants

The Rise in Virtual Assistants

The Growth of Digital & Virtual Assistants

They are referred to by various names including digital assistants, virtual assistants, voice assistants, and most recently smart speakers. Odds are you or someone you know has or soon will have one in their home. You may already use one on your phone. It is another in a series of digital advances designed to either make your life more convenient, find out more about you or potentially both.

Rather than having to undergo pesky typing into a digital device, users can simply make their request by speaking out loud into or at least near enough to the device so it can “hear”. They are in smartphones, televisions, computers, and in our automobiles. While this article will begin with a general look at the technology involved, we will ultimately focus on in-home voice speakers and their amazing growth in popularity in recent years.

 The History of Speech Recognition

Many don't realize how long speech recognition technology has been around. Bell Laboratories introduced it with a simple " Audrey " device in 1952. Audrey could recognize numbers spoken by one voice. In 1962, IBM introduced the "Shoebox" that could identify 16 English words. Slowly, speech recognition improved through the 1960s, when it included more vowels and consonants in various languages.

In the early to mid-1970s, the United States Defense Department got involved, and the technology made great strides. "Harpy" resulted in a system that could mimic the vocabulary of the average three-year-old. Eventually, Bell Labs introduced a system that could recognize multiple voices.

Subsequent advances in voice recognition were accomplished through predictive voice recognition, where words were recognized based on speech patterns. In 1987, a doll named Julie could mimic speech and was marketed as "...the doll that understands you." If that sounds creepy, consider what we place in our homes today.

In the 1990s, voice recognition became more available for consumers as computer speeds advanced. It was often cumbersome, however, and software frequently had to be trained to the user's voice. Systems were frustrating due to misunderstandings between the users and the software. Early phone editions were particularly aggravating as callers would have to repeat themselves incessantly to get the software to "understand" what they wanted.

With the growing popularity of the Internet, Google helped the technology take a huge step forward with its Google Voice Search App for the iPhone in the 2000s.

Another milestone in the development of voice assistants was in 2011 when IBM's "Watson" appeared on Television's "Jeopardy" program and Apple introduced Siri. Microsoft responded with Cortana in 2013; in late 2014, Amazon introduced Alexa and The Echo. The Assistant from Google debuted in 2016, as did the Echo Dot. Later that year, Google Home was launched.

The Growth of Voice Speakers in the Home

So, here we are now, over 65 years after Audrey recognized spoken numbers and 55 years after Shoebox was demonstrated at the World's Fair. Everybody, from doll makers to the US Department of Defense, has shown interest through that time. It has been employed in our phones and our cars. However, depending on your perspective, it is reaching a new level of convenience and voluntary intrusion.

Estimates are there are about 30 million Google Home and Amazon Echo voice speakers in American homes. Penetration is expected to reach 55% within the next four years. A growing number of companies like Lenovo, LG, Harmon Kardon, and even toy maker Mattel have set out to grab a share of this rapidly growing market. What's behind this growth, how is it impacting us, and what is next?

Convenience Trumps Privacy

Voice speakers, or as some are now calling AI voice speakers, are another example that people are willing to trade personal information and privacy for convenience and will pay for the privilege. Convenience is king; technology-based companies like Amazon and Google fully understand that. It also affords them something even more valuable than just the sales of these devices. These tech companies' real value is their consumer data and insights.

It is not unlike the sales of cheap printers in the 1990s and early 2000s. Affordable printer prices and convenience lured in consumers. They may not have been aware of the expensive replacement cartridges that awaited them. Companies promoting voice speakers may be making these devices more and more affordable to gain access and insight into consumer behaviour and information.

What This Means for Marketers

So, if all of this history and growth in voice recognition and, ultimately, AI voice speakers are interesting, what are the practical aspects for those with websites who want to sell more of their products and services? It starts with understanding that many of these activities are search-related. "Alexa, find me a local rock and roll radio station.", "Siri, who has the best pizza near us?" or "Google, what is tomorrow's weather going to be?" are basic searches initiated by voice rather than typing.

There are already over one billion searches conducted by voice every month. By 2020, just two years from now, it is predicted about a third of all searches will be performed without a screen. More and more people are joining the voice search option and feeling more comfortable with it, including those using voice speakers. This may help you craft verbally friendly SEO efforts along with written keyword strategies.

Why You Should Choose Orange Website

OrangeWebsite.com is an Icelandic-based web hosting solutions provider committed to the growth of our customers. We are in an internet-friendly country that respects the privacy of internet users. We provide hosting plans that can be paid through private secure and private payment options like Bitcoin and cash through the mail. Learn more by visiting OranageWebsite.com and get started today.

EVE Online Makes A Comeback

EVE Online Makes A Comeback

EVE Online 1 Million Skill Points Giveaway

Table of Contents

▼▼▼▼▼

EVE's Evolution

1 Mil Giveaway

How To Claim

The Future?

Final Thoughts

As some of you might know, OrangeWebsite isn't just Iceland's #1 hosting company. But the CEO and those who started early with the company are born and bread Icelandic folks and are proud to be such. Iceland doesn't have a huge population, about 372,000+ people, so we take great pride when the people in our country do great things. One thing the team at OrangeWebsite do enjoy is taking part in one of the world's largest MMORPG (Massively Multiplayer Online Roleplaying Game) Eve Online.

EVE Online, a game developed by the Icelandic company CCP Games, whose central HQ is not far from OrangeWebsite HQ, is one of the most complex and expansive MMORPGs ever created. It is a game set in a vast expanse of space, where players traverse through thousands of star systems, engage in epic space battles, trade commodities, and forge alliances. Since its inception in 2003, EVE Online has undergone numerous transformations, evolving to remain relevant and engaging for its player base.

However, with the advancements of other MMORPGs captivating the newer generations and the complexity of EVE Online being quite a deterrent for new players. Eve's population has dwindled over the years. In some ways, that is a good thing since back in EVE Online's population peaks, every gate from high-security to low-security areas where PVP was enabled was always camped. Now, with fewer people, it's easier to sneak in there for the good loot.

EVE Online's Evolution and Challenges

The community aspect of EVE Online is crucial to its gameplay. Players form corporations and alliances, engage in diplomatic negotiations, and can even partake in large-scale wars involving thousands of players. These player-driven events have led to some of the most memorable moments in gaming history, with stories of epic battles and cunning betrayals captivating the imaginations of gamers worldwide.

Over the years, CCP Games has consistently updated and expanded EVE Online, introducing new features, ships, and gameplay mechanics. However, the game has not been without its challenges. The complexity of EVE Online can be daunting for new players, and the game has faced criticism for its steep learning curve. Additionally, the evolving landscape of the gaming industry, with the rise of free-to-play models and mobile gaming, has posed significant challenges for subscription-based games like EVE Online.

Eve Online 1 Million Skill Points Giveaway

In response to these challenges and to attract new players while re-engaging veterans, CCP Games has implemented a series of innovative strategies. One of the most notable initiatives has been giving away 1 million free EVE Online skill points to new and old players. Skill points are a critical aspect of EVE Online, determining a player's abilities and access to advanced ships and equipment. This generous giveaway serves multiple purposes. For new players, it provides a much-needed boost, helping them overcome the initial hurdles and more quickly integrate into the game's complex systems.

For veteran players, it incentivises them to return to the game, rekindle old friendships, and perhaps even settle old scores. The impact of this initiative has been significant, with an influx of new players joining the game and a noticeable increase in overall activity within New Eden. The buzz generated by the giveaway has also reignited interest in EVE Online, with gaming forums and social media platforms abuzz with discussions about the game.

How To Claim Eve Online 1 Million Skill Points

Eve Online 1 Million Skill Points Forum

If you are new to EVE Online or a veteran of many years, you can get 1 million Eve Online Skill points by clicking the button below. You will see the signup form for Eve Online. If you are new, sign up and fill out the form.

But if you are already a player, you can see the button "highlighted in red in the image below." there is an option to log in if you are already a member.

Doing this via our link will grant you 1 million Eve Online skill points. Once you sign up or log in, you will see your EVE Online 1 Million Skill Points in

Claim your 1 million skill points on eve online icon
Claiming your Eve Online 1 Million Skill Points

The Future of EVE Online

As EVE Online evolves, the future looks bright for this unique MMORPG. CCP Games has shown a remarkable ability to adapt and innovate, ensuring the game remains fresh and engaging for its player base.

The company's commitment to its community, combined with its willingness to take bold steps to attract new players, has positioned EVE Online for continued success in the competitive gaming landscape.

Eve Online Free Skill Points copy

Free EVE Online Skill Points

There are some sneaky ways to get some Free Eve Online Skill Points. CCP like to hide some nice ways to give away skill points. For example, Omega subscribers in the New Eden store can claim Eve Online Skill Points for free every day when this giveaway is on.

In the example in the picture, you can see they are giving away 15,000 Eve Online Skill Points daily. Which essentially saves you 6 hours of training time every day.

Becoming an Eve Online Affiliate

Every Eve Online player can become an affiliate. You won't earn real money, but there are multiple rewards for signing people up via your link, and they get better the more people you sign up. The beauty of someone using your link gets them the 1 million Eve Online skill points we discussed above. 

The only downside is that you don't get any rewards unless they buy Plexes or subscribe to Omega. But it does work retroactively, so if a person who already is an Omega subscriber uses your link for the free Eve Online 1 million skill points, you won't get rewarded, but if they renew, you will get the reward then.

Initial Omega Upgrade Reward

Every time a player who uses your link signs up for Omega, you will get 15 days of Omega added to your character.

Reward 1 15 Days Omega

Plex Purches Reward

If the player who uses your affiliate link buys Eve Online Plexs, you will get 4x Master At Arms Cerebral Accelerators.

Reward 2 4x24H Accelerator

1x Signup

Triglavian Apparel

1 Recruit Triglavian Apparel

2x Signup

Pacifier BPC Plus Skin

2 Recruits Pacifier BPC and Unique Skin

5x Signup

1 Month Of Omega

5 Recruits 1 Month Omega

10x Signup

Enforcer BPC Plus Skin

10 Recruits Enforcer BPC and Unique Skin

20x Signup

2,000 Plex's

20 Recruits 2000 Plex

40x Signup

Marshal BPC Plus Skin

40 Recruits Marshal BPC and Unique Skin

Final Thoughts

From its humble beginnings as a dream shared by three Icelandic visionaries, EVE Online has become one of the most complex and engaging MMORPGs ever created. However, we have noticed its continued decline in numbers over the years, and most of us at OW who play feel this is because toxic PVP players can come into the PVE area and harass newer, unsuspecting players. 

For example, you and a few friends can fit a high DPS ship, find a new player in a PVE area just minding his own business mining, and you can blow up his ship before Concord, the in-game Police, show up and destroy yours. There are also various other mechanics in the game that can trick new players into triggering PVP in the PVE area.

In our opinion, this is probably more of the reason for its decline than the overwhelming complexity that may also put off new players. It might also be the reason why CCP added the bonus to get 1 million Eve Online skill points for new and older players. But will this new recruitment program turn the tide and bring more people in than those who are leaving?

Probably not! Since in this latest forum post titled "Eve Online 1 million skill points program not worth it" there are concerns with the lack of worthy rewards for people to recruit more players. But I guess time will only tell.

The Trouble with Let’s Encrypt

The Trouble with Let’s Encrypt

The Trouble With Lets Encrypt

Lets Encrypt Free SSL

Lets Encrypt Free SSL

SSL certificates all perform the same task, but they aren't all equal in quality. Let's Encrypt issues certificates that are free of cost and easy to install, with the aim of making secure Web connections as universal as possible. The downside of this approach is that its certificates don't offer much confidence in their authenticity. At OrangeWebsite, we've decided not to accept them on our shared hosting, though you can use them on a VPS or dedicated server. We'd like to let you know our reasons.

Not all SSL certificates are the same

Having an SSL certificate provides an encrypted connection between a browser and a Web server. The protocol family that supports this is widely known as SSL, but current versions are more properly called TLS. Connecting by TLS guarantees that the server belongs to the owner of the certificate. A certificate authority (CA) digitally signs the certificate, indicating it has confirmed its authenticity.

Anyone can create a self-signed certificate. It will enable encrypted connections, but without a CA's signature, there's no guarantee that the site owner is who it claims it is. Browsers warn users against trusting self-signed certificates.

Let's Encrypt acts as a “free, automated, and open certificate authority.” It allows anyone to set up a secure website at no cost and with little effort. This is good, but prominent figures in the tech industry have expressed serious concerns about its certificates.

The process for setting up a certificate is simple. A couple of commands on a Linux server will do the whole job. The problem is with the level of authentication provided. The only validation is that the applicant for the certificate controls the domain it's issued to. If you're getting a certificate for example.com, you have to register it from example.com. There's no checking who you are. This type is known as a “domain validated” certificate. Let's Encrypt isn't the only CA to issue domain validated certificates, but it's the only one that doesn't charge anything for them.

Certificates and trust

Just having an SSL certificate, especially one that's only domain validated, doesn't make a site trustworthy. It could be a near-lookalike for a well-known domain (e.g., micros0ft.com). Let's Encrypt has reportedly issued over 14,000 certificates to domains that impersonate PayPal.

Some domains allow users control of subdomains (e.g., mydomain.example.com). They can obtain certificates for their subdomains. This can give the impression of approval by a well-known site. The subdomain may redirect to a different domain, on an independent server which the primary domain has no control over.

The most trustworthy SSL certificates are EV certificates. EV stands for “extended validation” and signifies that the CA has met certain standards for checking the applicant's identity. It has checked and confirmed that the applying organization legally exists and is who it claims to be. Browsers generally indicate an EV certificate with a green symbol, such as a padlock.

Unfortunately, most people don't recognize the nuances. If they see a padlock, they're likely to assume the site is trustworthy. Since Let's Encrypt doesn't even require a payment method, its bar to registering a certificate is very low. It plans to check the Google Safe Browsing API for known phishing or malware sites, but that's about the extent of its checking. There have been confirmed reports of malvertisers using its certificates. When certificates are free, it's easy to set them up with throwaway domains.

We hope that in time, Internet users will better understand the difference between a secure site and a legitimate one. When the large majority of sites display a padlock in the address bar, browsers will need to make a clearer distinction among the levels of validation. Eventually they may warn users about sites whose certificates are only domain validated. If a browser did that today, though, it would have to issue a constant stream of warnings.

For the present, it's a good habit to click on the padlock symbol of a secure site if there's any doubt about it. The browser should give information about the site's level of validation and its owner of record. Some browsers, though, will say nothing more than “This site is secure.”

Openness and trust

Let's Encrypt has explained its policy. It argues that a CA is in a poor position to police a site's content. It's difficult to determine if a site is clean, and harder to check if it stays clean. The primary aim of the project is to make as much of the Web as possible use TLS. That will inevitably include rogue websites. These sites exist anyway; the only difference is that some people may trust them more when they see the padlock symbol.

Any issuer of domain validated certificates faces this risk, and even the EV level isn’t completely safe against malicious sites. A signed certificate isn't and can't be proof of trustworthiness. Let's Encrypt doesn't want to take on the role of a censor, and we appreciate that. At the same time, we don't want to give dishonest websites the appearance of legitimacy if we can avoid it.

We offer several options for purchasing SSL certificates. The lowest priced ones are domain validated, but the annual fee will discourage acquiring certificates for throwaway domains. For a better level of validation, we offer the Comodo InstantSSL certificate with business-level validation. The best validation comes with our Comodo EV certificates, either for a single domain or for multiple domains sharing the same IP address.

Balancing trust and openness can require some difficult tradeoffs. One of our chief goals is to enable free expression, but we don't want to be a magnet for deceptive and dangerous sites. We hope you understand the reasons for our choice. Feel free to contact us with any questions.

Stop! Thief! Online Identity Theft

Stop! Thief! Online Identity Theft

Stop! Thief! Online Identity Theft

Online Identity Theft

How Your Identity is Being Stolen

If you've had your identity stolen, you know the problems it can cause. Even a simple unauthorized use of a credit or debit card can cost you hours of frustration, sometimes tying up needed funds. The U.S. Department of Justice says about 18 million people per year are victims of at least some form of identity theft. While many of these thefts are conducted on a massive scale, others are much more targeted.

We may imagine that these hackers are sophisticated technological wonder kids or that they originate from Nigeria, but often, the story is much closer to home and individualized. In some cases, it's not all that complicated. In a recent highly publicized case, hackers obtained confidential data through a server using a default "admin" username and password that was never changed.

Stopping identity theft takes understanding how thieves are getting your information from you.

Data Theft from Large Companies

This is the most publicized area of identity theft because it affects so many people and is out of our control. Data breaches have occurred at companies ranging from retail stores to the recent breach at a major credit reporting agency. To conduct commerce today, we must be connected digitally, and these consumer-oriented companies need to verify identities. This means our personal information is stored on massive servers that are available to authorized employees and management, potentially to their technical contractors, and, of course, hackers.

Skimmers

If you've ever used a credit or debit card at a fuel pump, grocery store, retail store, ATM or elsewhere, you may have been susceptible to a card skimmer. These skimmers or "card readers" commonly fit over the original card strip or insert without impairing the transaction. The skimmers read the data from your card's magnetic strip and either store them to be retrieved by the thieves or digitally send them to a nearby device. In some cases, cameras are attached to or near them to see the PIN you have entered. Some skimmers use pads that fit over the original keypad of the device to gain your pin.

While credit card chips are designed to limit this theft, many chipped cards still contain a strip to make them versatile enough to use in non-chipped machines. While skimmers may be challenging to detect, inspect any credit card machine closely before use and attempt to move the cardholder to see if it is the original. Cover one hand with the other when entering your PIN, and make sure no one is looking over your shoulder.

Phishing

Phishing is one of the original forms of identity theft in the digital age, although today, it is more sophisticated than ever. Phishing usually involves the thief sending out many bulk or spam emails, "phishing" for a bite. These emails may urge you to update your personal information and direct you to a fake website where you are encouraged to input your personal information voluntarily. These faux websites may even include the company name in the URL and are often designed to mimic a company's original website closely. Phishing tactics may also claim you have an inheritance, won a contest or offer some other financial incentive to get your personal information.

Vishing

Vishing is essentially voice phishing using the telephone. The caller often poses as a bank or credit card company representative and uses suspected identity theft as the purpose of the call. They will ask you to verify your personal information. Instead, call your bank or credit card directly and ask if your data has been compromised.

Social Media and Internet Searches

There is already much data about you available on the internet without adding to the problem voluntarily on social media. Many users commonly display their birth dates, emails, places of work, education, work experience, and even phone numbers and addresses online. They can easily pose as "friends" to get more information. If you use social media, be careful of what data you make available and ensure that only invited friends can access your profile.

Handing Your Credit Card to Someone Else

When you hand your credit card to a server at a restaurant, a clerk at a hotel, or even let a family member borrow it, you increase the odds of identity theft. The front and back can be quickly and discretely photographed, videoed or copied for unauthorized use. New cards can be created from the data on your magnetic strip; all it takes is a simple card reader that can be plugged into any computer.

Trash

If you don't have a paper shredder, get one and use it. Many identity thefts come from your trash that contains personal mail and account data from banks, credit cards, and even tax forms. A credit card statement alone contains a wealth of information that can lead to problems when combined with just a few more pieces of information. Pre-approved credit card offers are a must-shred item.

Regular, Old Fashioned, Theft

When you realize how much personal information is in your wallet, cellphone, and even your car's glove compartment, you will take better steps to protect it. Protecting your cash and credit cards isn't enough today. Not when thieves will find your personal information just as, if not more, valuable. Always know where your phone, wallet, and personal information are located.

Conclusion

Being careful about identity theft is not paranoia. It is prudent. Be cautious about how and where you share your data, including cell phone calls in public places. Ensure you only share information on websites with a secure Hypertext Transfer Protocol Secure (HTTPS) address that designates your information to be encrypted. If you conduct e-commerce on a website, ensure you protect your customer's information safely with encryption. Be cautious and minimize your risk of identity theft.

What Is Two Factor Authentication (2FA)

What Is Two Factor Authentication (2FA)

What Is Two Factor Authentication (2FA)

two factor authentication 2fa

What Is Two Factor Authentication (2FA), And How Does It Benefit Companies?

Identity theft, hacking, and phishing attacks are all on the rise and cost individuals and businesses billions each year. A successful hacking attack typically costs the businesses that are its victims more than money. There is the additional expense, more challenging to quantify, of a damaged reputation as customers lose confidence in the company's ability to keep their data private and secure.

The Impact of Hacking Attacks on Business

According to a recent study by Lloyd’s of London, global hacking attacks cost businesses more than $400 billion each year. Those costs are multiplied by the expensive measures companies take to ensure the security of their data. For example, companies spend more than $75 billion each year on cybersecurity.

Small Businesses Are Not Safe From Hacking 

Until recently, those attacks were targeted primarily against multi-national corporations, but increasingly, cybercriminals are going after small businesses.  In 2013, 44% of small businesses reported at least one hacking attack, according to the National Small Business Association.  While large corporations can absorb the losses associated with a hacking or phishing attack, for small businesses, such attacks can be devastating regarding financial losses and damage to their reputation.

Identity Theft Affects Millions and Is Increasing Every Year

Cybercrimes affect not only businesses. According to the US Bureau of Justice, more than 17 million individuals were victims of identity theft in 2014, mainly through the hacking of their credit or debit card accounts. According to Business Insider, identity theft cost individuals almost $25 billion in 2013, $10 billion more than property theft.

The increase in recent years of hacking attacks on businesses and identity theft aimed at individuals has caused many companies to wonder if they can do anything to protect their data. Fortunately, there is a way for businesses to protect the privacy of their customers and the security of their personal information.

What Is Two Factor Authentication (2FA)?

Two-factor authentication, the latest advancement in information security systems, makes it more difficult for thieves to access customer data. Most security systems require customers to verify their identity by providing a password and User ID.

Two-factor authentication provides an added layer of security by requiring system users to enter additional information that only the user has, such as something only the user knows, like a PIN or answer to a security question; something they have in their possession, like a mobile phone or ID card; or a physical characteristic, like their fingerprint or voice.

Experts Agree:  Two Factor Authentication Protects Data Better

Following the 2013 hacking attack on the Saudi oil giant Saudi Aramco on Twitter. Experts agreed that it was time for Twitter to join other social media sites like Google in implementing two-factor authentication.  In an article with the title, “Following breaches, experts call for two-factor authentication on Twitter,” Chester Wisniewski, a senior security adviser for the security firm Sophos, wrote:

“It is high time Twitter implement something to augment account security. Two-factor authentication would be a great option for protecting high-profile brands, celebrities and those who simply want that extra layer of security for their online identity.”

The Benefits of Two-Factor Authentication

Two-factor authentication is relatively inexpensive to implement and offers several important benefits to help businesses protect the security of their data. Here are 4 of the most important benefits of two-factor authentication:

Improved security:  passwords and user ID numbers are relatively easy for cyber thieves to access.  Many people, for example, are afraid of forgetting their passwords and writing them down in one or more places thieves can find.  Two-factor authentication makes it more difficult for thieves to steal customer data with features such as one-time passwords (OTPs), suitable for only one login, information only the user has, or personal characteristics like fingerprints, which thieves can’t duplicate.

Increased worker productivity: Because two-factor authentication makes data more secure, companies are more confident about permitting their employees to work remotely. According to the Harvard Business Review, when the Chinese travel website Ctrip allowed its employees to work remotely from home, their productivity increased on average by more than 13%, and the company saved almost $2,000 per employee while also improving employee retention.

Reduced operating costs:  two factor authentication makes businesses more efficient and reduces operating costs.  For example, because there are fewer password resets, customers don’t need to call help desks as frequently.  In addition, companies spend less time contacting customers about suspicious activity on their accounts.  Finally, companies spend less money on expensive fraud review systems.

Customer satisfaction: Customers are naturally attracted to businesses that are better able to secure their data. When they see that a business requires additional security information, they feel protected and feel more positively about that business for ensuring their information is secure. Those positive feelings add to customer trust and boost customer retention.

Conclusion

Companies that fail to protect their customers' personal information lose money and reputation. For smaller businesses, those losses can be catastrophic. Fortunately, forward-thinking web hosting providers have developed innovative approaches to helping businesses with their data and privacy concerns. 

Founded in 2006, OrangeWebsite is a recognized industry leader in providing safe and secure web hosting services. Our two-factor authentication service includes a special one-time passcode sent to users through SMS, which users submit to ensure a secure login. The annual fee is just €94.

If you would like to know more about how we can make your website safer and more secure or about our two-factor authentication services, contact us today.