Blog

Archive for the ‘encryption’ category: Page 58

Jan 3, 2015

Legal Consulting Firm Believes Artificial Intelligence Could Replace Lawyers by 2030

Posted by in categories: architecture, automation, big data, business, complex systems, computing, cybercrime/malcode, disruptive technology, economics, encryption, engineering, ethics, finance, futurism, geopolitics, governance, government, human trajectories, information science, innovation, internet, law, law enforcement, military, neuroscience, philosophy, policy, privacy, robotics/AI, science, security, software, strategy, supercomputing, transhumanism, transparency

Quoted: “Tony Williams, the founder of the British-based legal consulting firm, said that law firms will see nearly all their process work handled by artificial intelligence robots. The robotic undertaking will revolutionize the industry, “completely upending the traditional associate leverage model.” And: “The report predicts that the artificial intelligence technology will replace all the work involving processing information, along with a wide variety of overturned policies.”

Read the article here > https://hacked.com/legal-consulting-firm-believes-artificial…yers-2030/

Dec 30, 2014

The Blockchain is the New Database, Get Ready to Rewrite Everything

Posted by in categories: architecture, automation, big data, bitcoin, business, complex systems, computing, cryptocurrencies, cyborgs, defense, disruptive technology, economics, education, encryption, engineering, finance, futurism, genetics, geopolitics, governance, government, hacking, hardware, human trajectories, information science, internet, law, military, mobile phones, nanotechnology, neuroscience, open access, open source, philosophy, physics, privacy, robotics/AI, science, scientific freedom, security, singularity, software, strategy, supercomputing, transhumanism, transparency

Quoted: “If you understand the core innovations around the blockchain idea, you’ll realize that the technology concept behind it is similar to that of a database, except that the way you interact with that database is very different.

The blockchain concept represents a paradigm shift in how software engineers will write software applications in the future, and it is one of the key concepts behind the Bitcoin revolution that need to be well understood. In this post, I’d like to explain 5 of these concepts, and how they interrelate to one another in the context of this new computing paradigm that is unravelling in front of us. They are: the blockchain, decentralized consensus, trusted computing, smart contracts and proof of work / stake. This computing paradigm is important, because it is a catalyst for the creation of decentralized applications, a next-step evolution from distributed computing architectural constructs.

Screen Shot 2014-12-23 at 10.30.59 PM

Read the article here > http://startupmanagement.org/2014/12/27/the-blockchain-is-th…verything/

Dec 29, 2014

Corporate Reconnoitering?

Posted by in categories: cybercrime/malcode, cyborgs, defense, economics, electronics, encryption, engineering, ethics, existential risks, finance, futurism, information science, innovation, life extension, physics, science, security, sustainability

Corporate Reconnoitering?

000000000 blitz 400
ABSOLUTE END.

Authored By Copyright Mr. Andres Agostini

White Swan Book Author (Source of this Article)

http://www.LINKEDIN.com/in/andresagostini

Continue reading “Corporate Reconnoitering?” »

Nov 23, 2014

BitCoin, Cryptocurrency, and Blockchain Technology — The Ethereum Primer

Posted by in categories: automation, big data, biotech/medical, bitcoin, business, complex systems, computing, disruptive technology, economics, encryption, energy, engineering, ethics, finance, futurism, geopolitics, government, hacking, hardware, human trajectories, information science, innovation, internet, journalism, law, materials, military, neuroscience, open access, open source, philosophy, physics, policy, privacy, science, scientific freedom, security, software, supercomputing, transparency

Quoted: “Ethereum will also be a decentralised exchange system, but with one big distinction. While Bitcoin allows transactions, Ethereum aims to offer a system by which arbitrary messages can be passed to the blockchain. More to the point, these messages can contain code, written in a Turing-complete scripting language native to Ethereum. In simple terms, Ethereum claims to allow users to write entire programs and have the blockchain execute them on the creator’s behalf. Crucially, Turing-completeness means that in theory any program that could be made to run on a computer should run in Ethereum.” And, quoted: “As a more concrete use-case, Ethereum could be utilised to create smart contracts, pieces of code that once deployed become autonomous agents in their own right, executing pre-programmed instructions. An example could be escrow services, which automatically release funds to a seller once a buyer verifies that they have received the agreed products.”

Read Part One of this Series here » Ethereum — Bitcoin 2.0? And, What Is Ethereum.

Read Part Two of this Series here » Ethereum — Opportunities and Challenges.

Read Part Three of this Series here » Ethereum — A Summary.

Nov 20, 2014

Bitcoin, Cryptocurrency, and Blockchain Technology — Voting Systems

Posted by in categories: automation, big data, bitcoin, business, complex systems, computing, disruptive technology, economics, encryption, engineering, ethics, geopolitics, government, hacking, hardware, information science, innovation, law, materials, open access, open source, philosophy, policy, polls, privacy, science, security, software, supercomputing, transparency, treaties

Quoted: “Bitcoin technology offers a fundamentally different approach to vote collection with its decentralized and automated secure protocol. It solves the problems of both paper ballot and electronic voting machines, enabling a cost effective, efficient, open system that is easily audited by both individual voters and the entire community. Bitcoin technology can enable a system where every voter can verify that their vote was counted, see votes for different candidates/issues cast in real time, and be sure that there is no fraud or manipulation by election workers.”


Read the article here » http://www.entrepreneur.com/article/239809?hootPostID=ba473f…aacc8412c7

Nov 20, 2014

Has the flawed password system finally had its day?

Posted by in categories: computing, cybercrime/malcode, encryption, privacy

— BBC

woman thinking in from of password graphic

Passwords are a pain. We choose simple words that are easy to remember, but equally easy for hackers to guess.

Yet we still forget them. And they also get stolen with alarming frequency.

Continue reading “Has the flawed password system finally had its day?” »

Nov 19, 2014

BitCoin, Cryptocurrency, and Blockchain Technology — FACTOM

Posted by in categories: automation, big data, biotech/medical, bitcoin, business, complex systems, computing, disruptive technology, economics, education, encryption, engineering, environmental, ethics, finance, futurism, geopolitics, hacking, information science, law, materials, open access, policy, science, security, software, supercomputing, transparency

Quoted: “The Factom team suggested that its proposal could be leveraged to execute some of the crypto 2.0 functionalities that are beginning to take shape on the market today. These include creating trustless audit chains, property title chains, record keeping for sensitive personal, medical and corporate materials, and public accountability mechanisms.

During the AMA, the Factom president was asked how the technology could be leveraged to shape the average person’s daily life.”

Kirby responded:

“Factom creates permanent records that can’t be changed later. In a Factom world, there’s no more robo-signing scandals. In a Factom world, there are no more missing voting records. In a Factom world, you know where every dollar of government money was spent. Basically, the whole world is made up of record keeping and, as a consumer, you’re at the mercy of the fragmented systems that run these records.”

Continue reading “BitCoin, Cryptocurrency, and Blockchain Technology — FACTOM” »

Nov 17, 2014

A New Economic Layer — BitCoin, Cryptorcurrency, and Blockchain Technology

Posted by in categories: big data, bitcoin, business, complex systems, computing, disruptive technology, economics, electronics, encryption, engineering, ethics, finance, futurism, geopolitics, hacking, human trajectories, information science, innovation, internet, law, materials, media & arts, military, open access, open source, policy, privacy, science, scientific freedom, security, software, supercomputing

Preamble: Bitcoin 1.0 is currency — the deployment of cryptocurrencies in applications related to cash such as currency transfer, remittance, and digital payment systems. Bitcoin 2.0 is contracts — the whole slate of economic, market, and financial applications using the blockchain that are more extensive than simple cash transactions like stocks, bonds, futures, loans, mortgages, titles, smart property, and smart contracts

Bitcoin 3.0 is blockchain applications beyond currency, finance, and markets, particularly in the areas of government, health, science, literacy, culture, and art.

Read the article here » http://ieet.org/index.php/IEET/more/swan20141110

Sep 26, 2014

Review: When Google Met WikiLeaks (2014) by Julian Assange

Posted by in categories: big data, bitcoin, computing, encryption, ethics, events, futurism, geopolitics, government, hacking, internet, journalism, law, law enforcement, media & arts, military, transhumanism, transparency
Julian Assange’s 2014 book When Google Met WikiLeaks consists of essays authored by Assange and, more significantly, the transcript of a discussion between Assange and Google’s Eric Schmidt and Jared Cohen.

Continue reading “Review: When Google Met WikiLeaks (2014) by Julian Assange” »

Jul 5, 2014

The Ultra-Simple App That Lets Anyone Encrypt Anything

Posted by in category: encryption

By — Wired
Original illustration: Getty
Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn’t figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video.

Nadim Kobeissi wants to bulldoze that steep learning curve. At the HOPE hacker conference in New York later this month he’ll release a beta version of an all-purpose file encryption program called miniLock, a free and open-source browser plugin designed to let even Luddites encrypt and decrypt files with practically uncrackable cryptographic protection in seconds.

“The tagline is that this is file encryption that does more with less,” says Kobeissi, a 23-year old coder, activist and security consultant. “It’s super simple, approachable, and it’s almost impossible to be confused using it.”

Read more

Page 58 of 58First5152535455565758