БЛОГ

Archive for the ‘security’ category: Page 133

Feb 14, 2016

History: I know that we often write about the future, etc

Posted by in categories: education, food, habitats, security, sustainability

However, one also must look at the past for insights and guidance on things that were done wrong to ensure bad history is not repeated.

Therefore, let me share with you a part of history that we need to be aware of and protect our future from ever repeating again.

Many folks have never heard of Poor Farms in the South and Poor Houses in some parts of the Midwest. Before soc. Security and Welfare we had poor farms/ houses. They date from the late 1800s until 1930s.

Poor farms/ houses were often filled with the elderly and others that had no money or anyone to take care them. People often worked the land for 16+ hours days, dressed in rags, and had very little to eat. Once you were there you could not leave ever until you died.

Continue reading “History: I know that we often write about the future, etc” »

Feb 13, 2016

IoT Could Be Used by Spies, U.S. Intelligence Chief Says

Posted by in categories: business, electronics, habitats, internet, security

More Intel Concerns


James Clapper tells senators the vulnerabilities in connected devices that hackers exploit can also be used for surveillance by foreign countries.

As the Internet of things has grown, so has the debate about security around it.

Continue reading “IoT Could Be Used by Spies, U.S. Intelligence Chief Says” »

Feb 12, 2016

Yes, robots will steal our jobs — but don’t worry, we’ll get new ones

Posted by in categories: biotech/medical, business, economics, employment, ethics, neuroscience, robotics/AI, security

Again, I see too many gaps that will need to be address before AI can eliminate 70% of today’s jobs. Below, are the top 5 gaps that I have seen so far with AI in taking over many government, business, and corporate positions.

1) Emotion/ Empathy Gap — AI has not been designed with the sophistication to provide personable care such as you see with caregivers, medical specialists, etc.
2) Demographic Gap — until we have a more broader mix of the population engaged in AI’s design & development; AI will not meet the needs for critical mass adoption; only a subset of the population will find will connection in serving most of their needs.
3) Ehtics & Morale Code Gap — AI still cannot understand at a full cognitive level ethics & empathy to a degree that is required.
4) Trust and Compliance Gap — companies need to feel that their IP & privacy is protected; until this is corrected, AI will not be able to replace an entire back office and front office set of operations.
5) Security & Safety Gap — More safeguards are needed around AI to deal with hackers to ensure that information managed by AI is safe as well as ensure public saftey from any AI that becomes disruptive or hijacked to cause injury or worse to the public

Until these gaps are addressed; it will be very hard to eliminate many of today’s government, office/ business positions. The greater job loss will be in the lower skill areas like standard landscaping, some housekeeping, some less personable store clerk, some help desk/ call center operations, and some lite admin admin roles.

Continue reading “Yes, robots will steal our jobs — but don’t worry, we’ll get new ones” »

Feb 10, 2016

CBS News investigation: Liquid biopsy giving false sense of security about cancer risk?

Posted by in categories: biotech/medical, security

Not good — CancerIntercept Detect and Monitor test is not providing accurate information in some results. The cancerIntercept test whole concept was to detect a growing tumor in the body, before the patient may notice symptoms — acting like a cancer stethoscope for detecting and monitoring cancer.


Pathway Genomics claims its liquid biopsy can detect cancer before patient shows symptoms — but expert says that promise is “years away”.

Read more

Feb 8, 2016

Hackers publish FBI employees‘ contact info

Posted by in category: security

Dangerous; now they’re a target.


Hackers, making good on a threat, published contact information for 20,000 FBI employees Monday afternoon, just one day after posting similar data on almost 10,000 Department of Homeland Security employees.”

Read more

Feb 7, 2016

Scientists Are Trying to Create An Untraceable ‘Quantum Internet’

Posted by in categories: internet, quantum physics, security

Glad that Stanford is working on their own version because the US Government has their own and it has been online in Los Alamos for a while now; have more than one version to learn from only enriches the final version.


Researchers are a step closer to building a quantum technology that could help improve internet security.

Researchers from Stanford University in U.S. have created a novel quantum light source to help improve internet security. In other words, the scientists have designed a technology that might someday serve as the basis for quantum communication.

Continue reading “Scientists Are Trying to Create An Untraceable ‘Quantum Internet’” »

Feb 6, 2016

Investment platforms must get back in the game

Posted by in categories: biotech/medical, finance, health, law, robotics/AI, security

Good article and perspective. And, I believe areas like Finance and Legal will be addressed over the next 5 to 7 years with AI. However, much of our critical needs are in healthcare particularly medical technology and Infrastructure (including security); and these need to get upgraded and improved now.


I recently read a thought provoking article by Klaus Schwab, called ‘The Fourth Industrial Revolution: what it means, how to respond’. At the beginning of the article Schwab describes the first three industrial revolutions, which I think we’re all fairly familiar with:

1784 – steam, water and mechanical production equipment.

Read more

Feb 6, 2016

Your only choice is to build better artificial intelligence tech than others: Brad Templeton

Posted by in categories: business, cybercrime/malcode, internet, mobile phones, nanotechnology, robotics/AI, security, singularity, transportation

Brand’s view and concerns about hacking driverless cars are valid. And, I do believe in time that government will eventually catch up in passing some laws that will make companies ensure that their technology is safe for consumer usage and are safe for the public. I just hope that the pendulum does swing too far to the other side of over regulation.


It is not easy to slot Brad Templeton. What do you make of a person who is not only the networks and computing chair at Singularity University in Silicon Valley but also a software architect, a director of the Foresight Nanotech Institute, board member of the cyberspace watchdog Electronic Frontier Foundation, the first person to have set up an Internet-based business, a futurist lecturer, hobby photographer, artist, as well as a consultant on Google’s driverless car design team?

In a phone interview from the US, Templeton, who will be in India this month as a key speaker during the SingularityU India Summit (to be held in association with INK, which hosts events like INKtalks—a platform for the exchange of cutting-edge ideas and inspiring stories), shared his views on driverless cars, the perceived threat from intelligent machines and censorship of the Internet. Edited excerpts:

Continue reading “Your only choice is to build better artificial intelligence tech than others: Brad Templeton” »

Feb 5, 2016

USENIX Enigma 2016 — Protecting High Risk Users

Posted by in categories: cybercrime/malcode, security

Eva Galperin, Electronic Frontier Foundation.
Morgan Marquis-Boire, Citizen Lab, University of Toronto.

Protecting high-risk individuals has always been a problem for the security industry. While many enterprises focus on mitigating scenarios that will affect the greatest number of their users, harm from attacks is not distributed proportionally. Cyber-attacks on high-risk individuals in dangerous situations can lead to torture, kidnapping, and worse. But dealing with targeted attacks is time-consuming and resource intensive. This problem is exacerbated when the target is an individual or small NGO rather than a large enterprise. This talk will discuss the challenges of protecting high-risk, targeted users using the experience of the speakers in assisting targeted NGOs and individuals.

Continue reading “USENIX Enigma 2016 — Protecting High Risk Users” »

Feb 4, 2016

Perspectives on the Cyber Physical Human World

Posted by in categories: cybercrime/malcode, privacy, quantum physics, robotics/AI, security

The 6th annual European Smart Grid Cyber Security conference (7th – 8th March 2016)

Boy! I wish I could attend this meeting. I can imagine all of the conversations now “Quantum” & “Cyber Attacks” with some good old AI thrown in the mix. I am also guess that the 2 articles this week on the NSA maybe brought up too.


SMi Group reports: The MITRE Corporation will be presenting at the SMi’s 6th annual European Smart Grid Cyber Security conference (7th – 8th March 2016)

Read more