Canon eyes robot only production for cameras

Canon Inc. is moving toward fully automating digital camera production in an effort to cut costs — a key change being played out across Japan, a world leader in robotics.

If successful, counting on machines can help preserve this nation's technological power — not the stereotype of machines snatching assembly line jobs from workers, Jun Misumi — company spokesman, said Monday.

The move toward machine-only production will likely be completed in the next few years, perhaps as soon as 2015, said Misumi, although he declined to give specific dates.

Japanese manufacturers have been moving production abroad recently to offset the earnings damage from the soaring yen.

And fears are growing about a hollowing-out of Japan Inc. as jobs move to China, India and the rest of Asia, where labor costs are cheaper.

Misumi was adamant that jobs won't be cut at Canon.

"When machines become more sophisticated, human beings can be transferred to do new kinds of work," he said.

Toyota Motor Corp. is also working on beefing up automated production not only to cut costs but achieve better quality.

In a recent plant tour for reporters, Toyota showed how welding got much faster and more precise through instantaneous laser-welding.

Toyota used that technology to make Lexus luxury models move and withstand sharp turns better.

Despite growing pressure from the high yen, Toyota is innovating production efficiency to keep annual Japan production at 3 million vehicles, about a third of its global production, by reducing costs through boosting robotics use.

Akihito Sano, professor at Nagoya Institute of Technology, said Japan needs to do more to fine-tune its sophisticated technology so robotics can become more practical, and was doing some soul-searching lately about practical applications.

Japan has tended to focus on research and come up with razzle-dazzle humanoids and then get been beaten in simple but practical products like the Roomba vacuum cleaner by iRobot Corp. of the United States, he said.

Honda Motor Co.'s walking and talking Asimo human-shaped robot comes with voice recognition, pours juice into a cup and can run around on two legs. But, unlike Roomba, it has yet to enter a real living room to do actual vacuuming and it merely plays mascot at events.

Since the late 1990s, like other manufacturers, Canon began using the "cell" production method, in which a team of workers or one worker puts together a major part, rather than doing a simple task over and over.

In recent years, robots have become so much a part of this cell production, Canon calls it "man-machine cell." Eventually, human involvement will be phased out in making some products, according to Canon.

In the U.S., Amazon.com Inc. is buying Kiva Systems, which makes robots and software to help companies fulfill orders, for $775 million.

Amazon has been using automation at its order fulfillment centers for some time. But Kiva's technology is designed to lower costs and will be used to help workers pick and pack books.

Sano, the academic, stressed the need for a system so workers can communicate with robots. He also stressed that there will always be room for human intelligence, using the Japanese for "craftsmanship," or "takumi."

"Human beings are needed to come up with innovations on how to use robots," said Sano. "Going to a no-man operation at that level is still the world of science fiction."
ReadmoreCanon eyes robot only production for cameras

Owen says he will play on despite leaving United

Former England forward Michael Owen said he hoped to continue playing top-level soccer after being told by Manchester United that his contract was not being renewed.

"I don't think I have lost the ability to score goals or play at a high level," Owen, who has endured a frustrating three years at United because of injury, told Sky Sports television on Thursday.

"I certainly feel as if I can still play at the top level so we will wait to see where that is. If it's not in the Premier League it may be further afield.

"I don't think the Championship (second division) would be an option, to be totally honest."

The 32-year-old former Liverpool, Real Madrid and Newcastle United striker, who last played in a competitive Manchester United game in November, had said earlier on Thursday that United were letting him go.

"The manager informed me after our testimonial match on Tuesday that the club would not be offering me a new contract," he wrote on his Twitter feed (https://twitter.com/#!/themichaelowen).

"I have loved every minute of the three years I have spent at such a fantastic club," added Owen, who was named European Footballer of the Year in 2001.

Owen signed from Newcastle on a free transfer in 2009 and went on to score 17 goals in 52 appearances, winning the 2011 Premier League title - his first English championship medal.

His most notable United strike was an injury-time winner in the Manchester derby three years ago but City got the upper hand this term as they pipped their rivals to the title.
ReadmoreOwen says he will play on despite leaving United

Nine Major Ways Criminals Use Facebook

1. Hacking Accounts

When criminals hack a Facebook account, they typically use one of several available “brute force” tools, Grayson Milbourne, Webroot’s Manager of Threat Research for North America, told 24/7 Wall St. in an interview. These tools cycle through a common password dictionary, and try commonly used names and dates, opposite hundreds of thousands of different email IDs. Once hacked, an account can be commande
ered and used as a platform to deliver spam, or — more commonly — sold. Clandestine hacker forums are crawling with ads offering Facebook account IDs and passwords in exchange for money. In the cyber world, information is a valuable thing.

2. Commandeering Accounts

A more direct form of identity theft, commandeering occurs when the criminal logs on to an existing user account using an illegally obtained ID and password. Once they are online, they have the victim’s entire friend list at their disposal and a trusted cyber-identity. The impostor can use this identity for a variety of confidence schemes, including the popular, London scam in which the fraudster claims to be stranded overseas and in need of money to make it home. The London scam has a far-higher success rate on Facebook — and specifically on commandeered accounts — because there is a baseline of trust between the users and those on their friends list.

3. Profile Cloning

Profile cloning is the act of using unprotected images and information to create a Facebook account with the same name and details of an existing user. The cloner will then send friend requests to all of the victim’s contacts. These contacts will likely accept the cloner as a friend since the request appears to be from someone they’re familiar with. Once accepted, the crook has access to the target’s personal information, which they can use to clone other profiles or to commit fraud. As Grayson Milbourne puts it, “Exploiting a person’s account and posturing as that person is just another clever mechanism to use to extract information.” Perhaps what’s scariest about this kind of crime is its simplicity. Hacking acumen is unnecessary to clone a profile; the criminal simply needs a registered account.

4. Cross-Platform Profile Cloning

Cross-platform profile cloning is when the cyber criminal obtains information and images from Facebook and uses them to create false profiles on another social-networking site, or vice versa. The principle is similar to profile cloning, but this kind of fraud can give Facebook users a false sense of security because their profile is often cloned to a social platform that they might not use. The result is that this kind of fraud may also take longer to notice and remedy.

5. Phishing

Phishing on Facebook involves a hacker posing as a respected individual or organization and asking for personal data, usually via a wall post or direct message. Once clicked, the link infects the users’ computers with malware or directs them to a website that offers a compelling reason to divulge sensitive information. A classic example would be a site that congratulates the victims for having won $1,000 and prompts them to fill out a form that asks for a credit card and Social Security number. Such information can be used to perpetrate monetary and identity fraud. Grayson Milbourne of Webroot, also explained that spearphishing is becoming increasingly common, a practice that uses the same basic idea but targets users through their individual interests.

6. Fake Facebook

A common form of phishing is the fake Facebook scam. The scammers direct users via some sort of clickable enticement, to a spurious Facebook log-in page designed to look like the real thing. When the victims enter their usernames and passwords, they are collected in a database, which the scammer often will sell. Once scammers have purchased a user’s information, they can take advantage of their assumed identity through apps like Facebook Marketplace and buy and sell a laundry list of goods and services. Posing as a reputable user lets the scammer capitalize on the trust that person has earned by selling fake goods and services or promoting brands they have been paid to advertise.

7. Affinity Fraud

In cases of affinity fraud, con artists assume the identity of individuals in order to earn the trust of those close to them. The criminal then exploits this trust by stealing money or information. Facebook facilitates this type of fraud because people on the site often end up having a number of “friends” they actually do not know personally and yet implicitly trust by dint of their Facebook connection. Criminals can infiltrate a person’s group of friends and then offer someone deals or investments that are part of a scheme. People can also assume an identity by infiltrating a person’s account and asking friends for money or sensitive information like a Social Security or credit card number.

8. Mining Unprotected Info

Few sites provide an easier source of basic personal information than Facebook. While it is possible to keep all personal information on Facebook private, users frequently reveal their emails, phone numbers, addresses, birth dates and other pieces of private data. As security experts and hackers know, this kind of information is often used as passwords or as answers to secret security questions. While the majority of unprotected information is mined for targeted advertising, it can be a means to more pernicious ends such as profile cloning and, ultimately, identity theft.

9. Spam

Not all spam — the mass sending of advertisements to users’ personal accounts — is against the law. However, the existence of Facebook and other social sites has allowed for a new kind of spam called clickjacking. The process of clickjacking, which is illegal, involves the hacking of a personal account using an advertisement for a viral video or article. Once the user clicks on this, the program sends an advertisement to the person’s friends through their account without their knowledge. This has become such an issue for the social media giant that earlier this year that the company has teamed up with the U.S. Attorney General to try to combat the issue.
ReadmoreNine Major Ways Criminals Use Facebook