Banks Turn to Blockchain Technology

November 9, 2015

Cryptocurrency has come a long way, and now big banks are taking the technology behind Bitcoin very seriously, we learn in “Nine of the World’s Biggest Banks Form Blockchain Partnership” at Re/code. Led by financial technology firm R3, banks are signing on to apply blockchain tech to the financial markets. A few of the banks involved so far include Goldman Sacks, Barclays, JP Morgan, Royal Bank of Scotland, Credit Suisse, and Commonwealth Bank of Australia. The article notes:

“The blockchain works as a huge, decentralized ledger of every bitcoin transaction ever made that is verified and shared by a global network of computers and therefore is virtually tamper-proof. The Bank of England has a team dedicated to it and calls it a ‘key technological innovation.’ The data that can be secured using the technology is not restricted to bitcoin transactions. Two parties could use it to exchange any other information, within minutes and with no need for a third party to verify it. [R3 CEO David] Rutter said the initial focus would be to agree on an underlying architecture, but it had not yet been decided whether that would be underpinned by bitcoin’s blockchain or another one, such as one being built by Ethereum, which offers more features than the original bitcoin technology.”

Rutter did mention he expects this tech to be used post-trade, not directly in exchange or OTC trading, at least not soon. It is hoped the use of blockchain technology will increase security while reducing security and errors.

Cynthia Murrell, November 9, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Data Analytics Is More Than Simple Emotion

November 6, 2015

Hopes and Fears posted the article, “Are You Happy Now? The Uncertain Future Of Emotion Analytics” discusses the possible implications of technology capable of reading emotions.  The article opens with a scenario from David Collingridge explaining that the only way to truly gauge technology’s impact is when it has become so ingrained into society that it would be hard to change.  Many computing labs are designing software capable of reading emotions using an array of different sensors.

The biggest problem ahead is not how to integrate emotion reading technology into our lives, but what are the ethical concerns associated with it?

Emotion reading technology is also known as affective computing and the possible ethical concerns are more than likely to come from corporation to consumer relationships over consumer-to-consumer relationships.  Companies are already able to track a consumer’s spending habits by reading their Internet data and credit cards, then sending targeted ads.

Consumers should be given the option to have their emotions read:

“Affective computing has the potential to intimately affect the inner workings of society and shape individual lives. Access, an international digital rights organization, emphasizes the need for informed consent, and the right for users to choose not to have their data collected. ‘All users should be fully informed about what information a company seeks to collect,’ says Drew Mitnick, Policy Counsel with Access, ‘The invasive nature of emotion analysis means that users should have as much information as possible before being asked to subject [themselves] to it.’”

While the article’s topic touches on fear, it ends on a high note that we should not be afraid of the future of technology.  It is important to discuss ethical issues right now, so groundwork will already be in place to handle affective computing.

Whitney Grace, November 6, 2015

Pew Report Compares News Sources: Twitter and Facebook

November 6, 2015

As newspapers fall, what is rising to take their place? Why, social media, of course. The Pew Research Center discusses its recent findings on the subject in, “The Evolving Role of News on Twitter and Facebook.” The number of Americans getting their news from these platforms continues to rise, across almost all demographic groups. The article informs us:

“The new study, conducted by Pew Research Center in association with the John S. and James L. Knight Foundation, finds that clear majorities of Twitter (63%) and Facebook users (63%) now say each platform serves as a source for news about events and issues outside the realm of friends and family. That share has increased substantially from 2013, when about half of users (52% of Twitter users, 47% of Facebook users) said they got news from the social platforms.”

The write-up describes some ways the platforms differ in their news delivery. For example, more users turn to Twitter for breaking news, while Facebook now features a  “Trending” sidebar, filterable by subject. The article notes that these trends can have an important impact on our society:

“As more social networking sites recognize and adapt to their role in the news environment, each will offer unique features for news users, and these features may foster shifts in news use. Those different uses around news features have implications for how Americans learn about the world and their communities, and for how they take part in the democratic process.”

Indeed. See the article for more differences between Facebook and Twitter news consumers, complete with some percentages. You can also see the data’s barebones results in the report’s final topline. Most of the data comes from a survey conducted across two weekends last March, among 2,035 Americans aged 18 and up.

Cynthia Murrell, November 6, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Machine Learning Is Play for Children

November 5, 2015

I heard an interesting idea the other idea.  Most parents think that when their toddler can figure out how to use a tablet that he or she is a genius, but did you ever consider that the real genius is the person who actually designed the tablet’s interface?  Soon a software developer will be able to think their newest cognitive system is the next Einstein or Edison says Computer World in the article, “Machines Will Learn Just Like A Child, Says IBM CEO.”

IBM’s CEO Virginia Rometty said that technology is to the point where machines are almost close to reasoning.  Current cognitive systems are now capable of understanding unstructured data, such as images, videos, songs, and more.

” ‘When I say reason it’s like you and I, if there is an issue or question, they take in all the information that they know, they stack up a set of hypotheses, they run it against all that data to decide, what do I have the most confidence in, ‘ Rometty said. The machine ‘can prove why I do or don’t believe something, and if I have high confidence in an answer, I can show you the ranking of what my answers are and then I learn.’ ”

The cognitive systems learn more as they are fed more data.  There is a greater demand for machines that can process more data and are “smarter” and handle routines that make it useful.

The best news about machines gaining the learning capabilities of a human child is that they will not replace an actual human being, but rather augment our knowledge and current technology.

Whitney Grace, November 5, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Journalists Use Dark Web Technology to Protect Source Privacy

November 4, 2015

Canada’s paper the Globe and Mail suggests those with sensitive information to reveal some Dark Web tech: “SecureDrop at the Globe and Mail.” As governments get less squeamish about punishing whistleblowers, those with news the public deserves to know must  be increasingly careful how they share their knowledge. The website begins by informing potential SecureDrop users how to securely connect through the Tor network. The visitor is informed:

“The Globe and Mail does not log any of your interactions with the SecureDrop system, including your visit to this page. It installs no tracking cookies or tracking software of any kind on your computer as part of the process. Your identity is not exposed to us during the upload process, and we do not know your unique code phrase. This means that even if a code phrase is compromised, we cannot comply with demands to provide documents that were uploaded by a source with that code phrase. SecureDrop itself is an open-source project that is subject to regular security audits, reducing the risk of bugs that could compromise your information. Information provided through SecureDrop is handled appropriately by our journalists. Journalists working with uploaded files are required to use only computers with encrypted hard drives and follow security best practices. Anonymous sources are a critical element of journalism, and The Globe and Mail has always protected its sources to the best of its abilities.

The page closes with a warning that no communication can be perfectly secure, but that this system is closer than most. Will more papers take measures to ensure folks can speak up without being tracked down?

Cynthia Murrell, November 4, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

IBM, China, and Source Code

November 3, 2015

The Google wanted China to change its stripes. IBM, if I understand the implications of “IBM Gives the Chinese Government Access to Software Code, is taking a more conciliatory approach.

The write up explains:

IBM said it is giving the Chinese government access to some software code, seeking to demonstrate the security of its products as the company tries to expand its business in the country.

The good news is:

Beijing won’t receive client data or “back doors” into the technology, International Business Machines Corp. said Friday in a statement. Technology providers including Microsoft Corp. have reached similar agreements in China, IBM said. Microsoft established a program with China in 2003, giving the government access to some Windows source code.

There you go.

IBM is buttoned up. The write up states:

IBM also reduces the risk that its intellectual property will be copied by granting the government access in a controlled environment on the company’s machinery, Wang said. IBM is probably revealing code for basic features, he said, rather than disclosing proprietary algorithms.

What could possibly go wrong? Perhaps IBM asked Watson, and the smart software suggested this source code thing as a way to generate more business in China. No information is available to me if the code for i2 and Cybertap were part of the deal. That ANB file format is or was a bit of a close hold.

Stephen E Arnold, November 3, 2015

It Is Not a Bird in the Law Firm

November 3, 2015

In science-fiction, artificial intelligence is mostly toyed around with in robots and androids.  Machines that bear artificial intelligence either try to destroy humanity for their imperfection or coexist with humanity in a manner that results in comedic situations.  In reality, artificial intelligence exists in most everyday objects from a mobile phone to a children’s toy.  Artificial intelligence is a much more common occurrence than we give our scientists credit for and it has more practical applications than we could imagine.  According to PR Newswire one of the top artificial intelligence developers has made a new deal for their popular product, “RAVN Systems’ Artificial Intelligence Platform Is Deployed At Berwin Leighton Paisner.”

RAVN Systems is known for their top of line software in enterprise search, unstructured big data analytics, knowledge management, and, of course, artificial intelligence. The international law firm Berwin Leighton Paisner recently deployed RAVN Systems’s  RAVN Applied Cognitive Engine (RAVN ACE).  RAVN ACE will work in the law firm’s real estate practice, not as a realtor, but as the UK’s first contract robot.  It will use cutting-edge AI to read and interpret information from documents, converting unstructured data into structured output.  RAVN ACE will free up attorneys to complete more complex, less menial tasks.

“Matthew Whalley, Head of Legal Risk Consultancy at BLP commented, ‘The robot has fast become a key member of the team. It delivers perfect results every time we use it. Team morale and productivity has benefited hugely, and I expect us to create a cadre of contract robots throughout the firm. If the reaction to our first application is any indication, we will be leading the implementation of AI in the Law for some time to come.’ ”

RAVN ACE has more applications than writing real estate contracts.  It can be deployed for financial services, media, telecommunications, and more.  Taking over the menial tasks will save on time , allowing organizations to reinvest time into other projects.

Whitney Grace, November 3, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google Hacks to Make You Grin

October 30, 2015

Google is run by a bunch of geeks that entertain themselves using the high tech toys at their fingertips.  Beyond the insertion of Douglas Adams references in search results, there are other Google hacks that the tech geeks developed to make themselves and you smile.  Digital Spy tracked down “Eleven Google Secrets That Will Change The Way You Search, From Playing Pac-Man To Lego Street View.”

“Day after day you hammer out search after search, overlooking not only the hidden gems lurking beneath the surface, but the very thing that makes Google such an anomaly amongst the world’s biggest companies – its sense of humor. Here are a few thinks you might not have known you can do in Google.”

Google can do numerous things just by typing a few simple commands into the search bar.  Try typing: “askew” or “tilt,” “do a barrel roll,” and “Zerg rush.”  Google is also a time machine and can take you back to the 1998 Google interface or you can spend hours playing Pac-Man on an uploaded Google Doodle from May 2010.  The yellow stick figure on Google Street View also likes to play dress-up when he visits certain places.

But our absolute favorite is the six degrees of Kevin Bacon calculator.  Based off an old Internet meme that everyone in Hollywood has worked with Kevin Bacon in less than six degrees, type in a famous person and “bacon number” to find out how close their careers are.

Little hacks and fun games like this show the human side to the Google empire.  What will they think of next?  However, it would be nice if Google added some practical functions, such as a time and date feature.

Whitney Grace, October 30, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Latest Global Internet Report Available

October 30, 2015

The Internet Society has made available its “Global Internet Report 2015,” just the second in its series. World-wide champions of a free and open Internet, the society examines mobile Internet usage patterns around the globe. The report’s Introduction explains:

“We focus this year’s report on the mobile Internet for two reasons. First, as with mobile telephony, the mobile Internet does not just liberate us from the constraints of a wired connection, but it offers hundreds of millions around the world their only, or primary, means of accessing the Internet. Second, the mobile Internet does not just extend the reach of the Internet as used on fixed connections, but it offers new functionality in combination with new portable access devices.”

It continues with this important warning:

“The nature of the Internet should remain collaborative and inclusive, regardless of changing means of access. In particular, the mobile Internet should remain open, to enable the permission-less innovation that has driven the continuous growth and evolution of the Internet to date, including the emergence of the mobile Internet itself.”

Through the report’s landing page, above, you can navigate to the above-cited Introduction, the report’s Executive Summary, and Section 2: Trends and Growth. There is even an interactive mobile Internet timeline. Scroll to the bottom to download the full report, in PDF, Kindle, or ePub formats. The download is free, but those interested can donate to the organization here.

Cynthia Murrell, October 30, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

CSI Search Informatics Are Actually Real

October 29, 2015

CSI might stand for a popular TV franchise, but it also stands for “compound structured identification” Phys.org explains in “Bioinformaticians Make The Most Efficient Search Engine For Molecular Structures Available Online.” Sebastian Böcker and his team at the Friedrich Schiller University are researching metabolites, chemical compounds that determine an organism’s metabolism.  Metabolites are used to gauge information about the condition of living cells.

While this is amazing science there are some drawbacks:

“This process is highly complex and seldom leads to conclusive results. However, the work of scientists all over the world who are engaged in this kind of fundamental research has now been made much easier: The bioinformatics team led by Prof. Böcker in Jena, together with their collaborators from the Aalto-University in Espoo, Finland, have developed a search engine that significantly simplifies the identification of molecular structures of metabolites.”

The new search works like a regular search engine, but instead of using keywords it searches through molecular structure databases containing information and structural formulae of metabolites.  The new search will reduce time in identifying the compound structures, saving on costs and time.  The hope is that the new search will further research into metabolites and help researchers spend more time working on possible breakthroughs.

Whitney Grace, October 29, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta