Blog

Archive for the ‘information science’ category: Page 309

Jul 25, 2015

IBM believes blockchain is an “elegant solution” for Internet of Things

Posted by in categories: automation, big data, bitcoin, complex systems, disruptive technology, information science, internet

Quoted: “IBM’s first report shows that “a low-cost, private-by-design ‘democracy of devices’ will emerge” in order to “enable new digital economies and create new value, while offering consumers and enterprises fundamentally better products and user experiences.” “According to the company, the structure we are using at the moment already needs a reboot and a massive update. IBM believes that the current Internet of Things won’t scale to a network that can handle hundreds of billions of devices. The operative word is ‘change’ and this is where the blockchain will come in handy.”

Read the article here > https://99bitcoins.com/ibm-believes-blockchain-elegant-solut…of-things/

Jul 23, 2015

2015 IEEE International Geoscience and Remote Sensing Symposium | July 26–31, 2015 | Milan, Italy

Posted by in categories: big data, complex systems, computing, food, information science, machine learning, mapping, space, surveillance, sustainability

MilanPhotoCollage_md


Hosted by the IEEE Geoscience and Remote Sensing Society, the International Geoscience and Remote Sensing Symposium 2015 (IGARSS 2015) will be held from Sunday July 26th through Friday July 31th, 2015 at the Convention Center in Milan, Italy. This is the same town of the EXPO 2015 exhibition, whose topic is “Feeding the planet: energy for life”.

Read more

Jul 18, 2015

Algorithms Based on Brains Make For Better Networks

Posted by in categories: computing, information science, neuroscience

Researchers take inspiration from the developing brain to create improved computer algorithms.

Read more

Jul 7, 2015

Passfaces: Strong authentication for the masses

Posted by in categories: big data, business, computing, encryption, finance, information science, internet

Last year, Google began experimenting with hardware-based schemes for user-authentication, while Apple added two factor authentication to iCloud and Apple ID users. They began sending a verification code to users via a mobile number registered in advance.

Security pundits know that two factor authentication is more secure than simple passwords. As a refresher, “Factors” are typically described like this:

  • Something that you know (a password — or even better, a formula)
  • Something that you have (Secure ID token or code sent to cell phone)
  • Something that you are (a biometric: fingerprint, voice, face, etc.)

The Google project may be just another method of factor #2. In fact, because it is small (easily misplaced or stolen), it simplifies but does not improve on security. I suggest a radical and reliable method of authentication. It’s not new and it’s not my idea…

password_key

Continue reading “Passfaces: Strong authentication for the masses” »

Jul 5, 2015

Google’s Dream Robot Is Running Wild Across the Internet

Posted by in categories: information science, neuroscience, robotics/AI

Remember a few weeks back, when we learned that Google’s artificial neural network was having creepy daydreams, turning buildings into acid trips and landscapes into Magic Eye pictures? Well, prepare to never sleep again, because last week, Google made its “inceptionism” algorithm available to the public, and the nightmarish images are cropping up everywhere.

Read more

Jun 19, 2015

A computational algorithm for fact-checking

Posted by in category: information science

These charts map the “truth scores” of statements related to geography, history and entertainment. Correct statements appear along the diagonal, with color intensity indicating the strength of the score (credit: Giovanni Ciampaglia)

Read more

Jun 10, 2015

Oculus Rift, Magic Leap, and the Future of Reality … By Ava Kofman | The Atlantic

Posted by in categories: augmented reality, electronics, hardware, information science, innovation, media & arts, software, virtual reality

lead_960

Vannevar Bush’s prediction, half a century later, rings true: “The world has arrived at an age of cheap complex devices of great reliability; and something is bound to come of it.”

Read more

Jun 5, 2015

Ex-Googlers Get Millions to Help You Build the Next Google — Klint Finley Wired

Posted by in categories: information science, internet, software, supercomputing

gooooogle

After Spencer Kimball left Google, he found himself missing some of the custom-built software the company uses internally. So he and a bunch of fellow ex-Googlers started building their own. And now they want to make it available to everyone to power the next Google or Facebook.

Specifically, Kimball wanted something like Google’s database system Spanner. Spanner is designed to juggle data between potentially millions of database servers, a tool that keeps Google’s services online even if several servers, or an entire datacenter, go offline. While few companies need to operate at quite the scale Google does, the ability to stay online even if many systems fail, and to automatically balance resources between servers, would be useful to many other companies. Read more

Jun 4, 2015

A New York State of Megabits — Susan Crawford | Backchannel

Posted by in categories: architecture, big data, business, economics, education, energy, information science, internet, moore's law

1*jK9tSvzX0SweZGgJG_d_3g

So it was great to get back to New York and be able to report on what is called the“New NY Broadband Program.” It involves a $500 million expenditure to help ensure that New Yorkers across the state have access to current-generation Internet capacity. There’s lots of potential in the plan, targeted at providing every New Yorker with access to 100 megabit per second (Mbps) service (10 Mbps uploads) by the end of 2018. Because New York expects a 1:1 match from the private sector for each grant or loan it makes, that means the state hopes to be deploying at least $1 billion on high-speed Internet access infrastructure.

Read more

Jun 3, 2015

How the Tech Behind Bitcoin Could Stop the Next Snowden — Klint Finley Wired

Posted by in categories: bitcoin, encryption, government, hacking, information science, privacy, security

The National Security Agency knows Edward Snowden disclosed many of its innermost secrets when he revealed how aggressive its surveillance tactics are. What it doesn’t know is just how much information the whistleblower took with him when he left.

For all of its ability to track our telecommunications, the NSA seemingly has little clue exactly what documents, or even how many documents, Snowden gave to the media. Like most large organizations, the NSA had tools in place to track who accessed what data and when. But Snowden, a system administrator, apparently was able to cover his tracks by deleting or modifying the log files that tracked that access. Read more