General Dynamics Gets $10 Billion Saudi Arms Order
IndustryWeek, February 14, 2014
The Canadian subsidiary of U.S. arms maker General Dynamics has won a $10 billion order for armored
vehicles for Saudi Arabia.
The vehicles will be produced by General Dynamics Land Systems-Canada (GDLS) in London, Ontario, and
the deal could be worth up to $13 billion if all options are exercised, according to securities filings.
The agreement also includes associated equipment, training and support services.
The San Francisco Chronicle newspaper is reporting that Apple’s merger and acquisition chief
Adrian Perica met with Elon Musk, CEO of electric car manufacturers Tesla last spring.
Apple has previously shown its hand in this market and announced deals with BMW, Daimler, Mercedes
and Honda to produce smart dashboards featuring iOS, the same operating system used by iPads and iPhones.
Big data is at a crossroads. On one hand, big data is dead, the term having been used so often that it’s
been stripped of tangible value.
On the other hand, big data has never been so alive, as more companies than ever are trying to improve
so-called big data analytics. How can such a dichotomy exist? The answer can be found in the enormous gap
between what big data means by definition and what it really means in the important practice of data management.
Computers do many things faster and more efficiently than the human brain, but they’re decidedly
inferior when it comes to extracting meaning from human language. As BigData-Startups.com founder Mark van
Rijmenam writes in a recent blog post, the key stumbling block here is that computers
understand “unambiguous and highly structured” programming language, while human language is a
minefield of nuance, emotion, and implied intent.
As the hacking pandemic sweeps through companies, a startup says analytics can help. Cybereason, co-founded
by Lior Div, a former cybercrime expert in the Israeli intelligence agency, uses new algorithms to fight what
it calls “malops” -- malicious operations perpetrated by hackers who break into a company's network.