БЛОГ

Archive for the ‘security’ category: Page 63

Jan 18, 2022

Chinese Property Giant Said Its Employee of The Year Was Not a Human, But an AI Program

Posted by in categories: economics, robotics/AI, security

At first glance, Cui is depicted as a beautiful young professional in her 20s who joined Vanke’s accounting department in February 2021 and is the recipient of the company’s Best Newcomer Award. Cui has a 91.44 percent success rate in collecting overdue payments. In December 2021, Baixin Bank launched its first virtual employee named AIYA, and Jiangnan Rural Commercial Bank launched its VTM digital employees. Earlier in April 2019, Shanghai Pudong Development Bank introduced its first AI-powered digital employee named Xiaopu, capable of serving its bank users at different posts Notably, China’s first “meta-human” AYAYI made its debut on Chinese e-commerce platform Xiaohongshuin in May 2021. The hyper-realistic digital human garnered three million views on its first post.

According to a 2019 report compiled by Deloitte, a global professional services network, experts predict that using AI at a larger scale will add as much as $15.7 trillion to the global economy by 2030.Deloitte’s report shows that from 2015 to 2020, the average annual compound growth rate of the global artificial intelligence market was 26.2 percent, while the growth rate of the Chinese AI market during the same period was 44.5 percent. Another report by Deloitte suggests that in 2025 the scale of China’s artificial intelligence industry will exceed $85 billion.

Presently, there are about 2,600 artificial intelligence companies in China. Most located in Beijing’s Haidian District technology hub, The Center for Security and Emerging Technology (CSET), a U.S. think tank, estimated the CCP’s total R&D investment in artificial intelligence in 2018 was between $2 billion and $8.4 billion.

Continue reading “Chinese Property Giant Said Its Employee of The Year Was Not a Human, But an AI Program” »

Jan 18, 2022

Free-Space Optical Communication

Posted by in categories: internet, security, space

FSO communication systems are where free space acts as a communication channel between transceivers that are line-of-sight (LOS) for successful transmission of optical signals. The channel can be atmosphere, space, or vacuum, whose characteristics determine the transmission and reception of optical signals for designing reliable and efficient communication systems. Using FSO technology data is transmitted by propagation of light through atmospheric or space communication channels, allowing optical connectivity. FSO communication offers a high data rate to meet the tremendous increasing demand of broadband traffic mostly driven by Internet access and HDTV broadcasting services. Compared to fiber optics technology, FSO offers much more flexibility in designing optical network architectures at very high speeds, at tens and hundreds of Gbit/s rates. However, FSO communication is affected by atmospheric effects, which limits sensitivity and achievable data rates with acceptable BER. Some of these degradations are turbulence, absorption, and scattering, and various mitigation techniques exist for reliable and efficient data transmission [1] and to increase the communication performance. Both point-to-point, point-to-multipoint, multipoint-to-point, and multipoint-to-multipoint FSO communications are possible, depending on the different scenarios of establishing optical links. FSO communication is the most practical alternative to solve the bottleneck broadband connectivity problem. The data rates provided by FSO links continue to increase in both long-and short-range applications. FSO will be one of the most unique and powerful tools to address connectivity bottlenecks that have been created in high-speed networks during the past decade due to the tremendous success and continued acceptance of the Internet. The next generation of Internet connectivity will push the limits of existing infrastructure with high-bandwidth applications such as videoconferencing, streaming multimedia content, and network-enabled portable devices. Clearing these bottlenecks is crucial for the future growth and success of the contemporary Internet society. The bandwidth of optical communications access and edge networks will be needed to satisfy these demands. Communication systems are concerned with the transmission of information from a source to a user. The purpose of a communication system is therefore to transfer information. A very basic block diagram of any communication system (optical or radiofrequency (RF)) is shown in Fig. 4.1.

Fig. 4.1 shows a single point-to-point system, whereas in a multiplexed system there may be multiple input and output message sources and users (also called destinations). Fig. 4.2 shows other possible configurations and links for multipoint connections.

OWC is the next frontier for high-speed broadband connection and offers the following unique features and advantages: high bandwidth/capacity, ease of deployment, compact size, low power, and improved channel security. OWC can transmit and exchange voice and video communication data through the atmosphere/free-space at the rates of tens of Gbit/s and much more.

Jan 16, 2022

Microsoft pulls new Windows Server updates due to critical bugs

Posted by in category: security

Microsoft has pulled the January Windows Server cumulative updates after critical bugs caused domain controllers to reboot, Hyper-V to not work, and ReFS volume systems to become unavailable.

Tuesday, Microsoft released the January 2022 Patch Tuesday updates for Windows Server that includes numerous security updates and bug fixes.

These updates are KB5009624 for Windows Server 2012 R2, KB5009557 for Windows Server 2019, and KB5009555 for Windows Server 2022.

Jan 11, 2022

Raspberry Pi system can detect viruses on other devices without use of software

Posted by in categories: biotech/medical, computing, mobile phones, security

A team of researchers at the Institute of Computer Science and Random Systems has built a non-software-based virus detection system using a Raspberry Pi, an H-field probe and an oscilloscope to detect electromagnetic wave signatures of multiple types of viruses. The team presented its system and test results at last month’s ACM Machinery’s Annual Computer Security Applications Conference and published a paper describing their system on ACM’s Research Article page.

The idea behind the new system is that running software generates electromagnetic waves. And each piece of software generates its own unique wave patterns due to the way the software executes its code. The researchers took advantage of this knowledge and began using an H-field probe to capture wave patterns of known computer viruses running on various devices and viewed the results on an oscilloscope. They saw oscilloscope patterns that were unique to individual viruses as they were running. The researchers used that information to program a Raspberry Pi to identify data from the other two devices to recognize known virus wave patterns, using the system as a virus detector. To determine if a virus is running on a computer, IoT device or smartphone, a user places the H-field probe close enough to the device to read the electromagnetic waves that are generated. The Raspberry Pi then reports on whether it found any viruses, and if so, which ones.

Jan 10, 2022

Xage lands $30M to bring identity security to ‘real world’ infrastructure

Posted by in category: security

Xage, which offers zero trust identity security for operational technology customers, raised a $30 million series B to scale its deployments.

Jan 7, 2022

What is the smart factory? The impact of factory 4.0 on manufacturing

Posted by in categories: business, information science, internet, neuroscience, security

Smart factories will be very useful in metaverse.workers can operated machines in factories using Internet.


As the idea of interconnected and intelligent manufacturing is gaining ground, competing in the world of Industry 4.0 can be challenging if you’re not on the very cusp of innovation.

Seeing the growing economic impact of IIoT around the globe, many professionals and investors have been asking themselves if the industry is on the verge of a technological revolution. But judging from the numbers and predictions, there is tangible and concrete evidence that the idea of smart manufacturing has already burst into corporate consciousness. According to IDC, global spending on the Internet of Things in 2020 is projected to top $840 billion if it maintains the 12.6% year-over-year compound annual growth rate. There is no doubt that a huge part of this expenditure will be devoted to the introduction of IoT into all types of industry, especially including manufacturing.

Continue reading “What is the smart factory? The impact of factory 4.0 on manufacturing” »

Jan 7, 2022

JFrog researchers find JNDI vulnerability in H2 database consoles similar to log4shell

Posted by in category: security

JFrog’s senior director of security research said the vulnerability has a root cause similar to Log4Shell.

Jan 6, 2022

Coming to a Mall Nearby? RoboCop Isn’t Just Fiction Anymore

Posted by in categories: finance, robotics/AI, security

Picture credit: Knightscope.

The following post was written and/or published as a collaboration between Benzinga’s in-house sponsored content team and a financial partner of Benzinga.

Robots patrolling around shopping malls, casinos and places of work actively looking for criminal activity might no longer be something straight out of a science fiction novel or movie. Knightscope, Inc., a Silicon Valley Based startup, is building and deploying fully autonomous security robots that deter, detect and report crime.

Jan 5, 2022

First Microsoft Pluton-powered Windows 11 PCs to start rolling out this year

Posted by in categories: computing, security

The first PCs to incorporate Microsoft’s Pluton security chip will be available from Lenovo this May.

Jan 5, 2022

Experimental quantum teleportation of propagating microwaves

Posted by in categories: quantum physics, security

The field of experimental quantum communication promises ways of efficient and unconditional secure information exchange in quantum states. The possibility of transferring quantum information forms a cornerstone of the emerging field of quantum communication and quantum computation. Recent breakthroughs in quantum computation with superconducting circuits trigger a demand for quantum communication channels between superconducting processors separated in space at microwave length frequencies. To pursue this goal, Kirill G. Fedorov, and a team of scientists in Germany, Finland and Japan demonstrated unconditional quantum teleportation to propagate coherent microwave states by exploring two-mode squeezing and analog feedforward across a distance of 0.42 m. The researchers achieved a teleportation fidelity of F= 0.689±0.004, which exceeded the asymptotic no-cloning threshold, preventing the use of classical error correction methods on quantum states. The quantum state of the teleported state was preserved to open the avenue towards unconditional security in microwave quantum communication.

Quantum teleportation (QT).

The promise of quantum communication is based on the delivery of efficient and unconditionally secure ways to exchange information by exploring the quantum laws of physics. Quantum teleportation (QT) is an exemplary protocol that stands out to allow the disembodied and safe transfer of unknown quantum states using quantum entanglement and classical communication as resources. Recent progress in quantum computation with superconducting circuits has led to quantum communication between spatially separated superconducting processes functioning at microwave length frequencies. Methods to achieve this communication task includes the propagation of two-mode squeezed (TMS) microwaves to entangle remote qubits and teleport microwave states to interface between remote superconducting systems. Fedorov et al. demonstrated the deterministic QT of coherent microwave states by exploring two-mode squeezing and analog feedforward across a distance of 0.

Page 63 of 148First6061626364656667Last