The effects of Artificial Intelligence (AI) technologies have already been experienced by the people globally and the increasing utilization of technology has proven a revolutionary advancement in the current scenario of digitization. Knowledge reasoning, planning, machine learning, robotics, computer vision, and graphics are few of the most commonly used areas where the AI has exposed the potential to ease the result oriented operations. In addition to the above, the most common machinery i.e. smartphones are even now available with high-end AI rich features and functionalities. AI enabled smartphones can now be noticed in terms of learning the continued user behavior and applying the same itself, improved security of rich features and enhanced voice assistants exhibiting AI rich functionalities. However, the exposure of Artificial Intelligence like broadest technologies must not be limited up to improved machinery rich features along with process optimization and automation. There are the other best set of fields predicted to get benefit under the global hug of AI worldwide which are hereby mentioned below.
Category: security
With Food Security Becoming One Of Our Biggest Challenges For Humankind’s Survival, What’s On The Menu For The 9 Billion People Inhabiting The World By 2050?
Posted in bioengineering, biological, climatology, security | Leave a Comment on With Food Security Becoming One Of Our Biggest Challenges For Humankind’s Survival, What’s On The Menu For The 9 Billion People Inhabiting The World By 2050?
Food security is one of the biggest challenges we’re facing as we move further into this century. Changing climate, pests, stress on water and land are all limiting our ability to produce sufficient amounts of food. making food production an issue.
Synthetic biology offers ways to help produce and supply enough safe and nutritious food sustainably for the estimated 9 billion people that will inhabit the planet by 2050.
Here are a few ways how.
Apple’s FaceID authentication system started moving smartphone users away from relying on fingerprints to secure their mobile devices, which are arguably less secure. But researchers think they’ve come up with an even better biometric tool for protecting a device that uses a part of the body that’s nearly impossible to spoof: a user’s ear canals.
A team of researchers led by Zhanpeng Jin, an associate professor in the Department of Computer Science and Engineering in the University of Buffalo’s School of Engineering and Applied Sciences, created a new authentication tool called EarEcho, which is somewhat self-explanatory. The team modified a set of off the shelf earbuds with a tiny microphone that points inside the wearer’s ear, not out towards the world around them. It’s not there to pick up ambient sounds to facilitate a noise-canceling or feature, or even the wearer’s voice for making calls; the tiny mic is instead tuned to listen to the echo of sounds as they’re played and then propagate through the ear canal.
SHA-256 is a one way hashing algorithm. Cracking it would have tectonic implications for consumers, business and all aspects of government including the military.
It’s not the purpose of this post to explain encryption, AES or SHA-256, but here is a brief description of SHA-256. Normally, I place reference links in-line or at the end of a post. But let’s get this out of the way up front:
- Sept 11: Original disclosure
- Sept 11: Community skepticism
- Sept 12: Claim retracted: [announcement] [press]
One day after Treadwell Stanton DuPont claimed that a secret project cracked SHA-256 more than one year ago, they back-tracked. Rescinding the original claim, they announced that an equipment flaw caused them to incorrectly conclude that they had algorithmically cracked SHA-256.
“All sectors can still sleep quietly tonight,” said CEO Mike Wallace. “Preliminary results in this cryptanalytic research led us to believe we were successful, but this flaw finally proved otherwise.”
Yeah, sure! Why not sell me that bridge in Brooklyn while you backtrack?
The new claim makes no sense at all—a retraction of an earlier claim about a discovery by a crack team of research scientists (pun intended). The clues offered in the original claim, which was issued just one day earlier, cast suspicion on the retraction. Something fishy is going on here. Who pressured DuPont into making the retraction—and for what purpose? Something smells rotten in Denmark!
Let’s deconstruct this mess by reviewing the basic facts:
- Wall Street, financial services firm claims they have solved a de facto contest in math & logic
- They cracked the code a year ago, yet— incredibly—kept it secret until this week
- A day later (with no outside review or challenge),* they admit the year-old crack was flawed
Waitacottenpickensec, Mr. DuPont!! The flaw (an ‘equipment issue’) was discovered a year after the equipment was configured and used—but just one day after you finally decided to disclose their past discovery? Poppycock!
I am not given to conspiracy theories (a faked moon landing, suppressing perpetual motion technology, autism & vaccinations, etc)—But I recognize government pressure when I see it! Someone with guns and persuasion convinced DuPont to rescind the claim and offer a silly experimental error.
Consider the fallout, if SHA-256 were to suddenly lose public confidence…
- A broken SHA-256 would wreak havoc on an entrenched market. SHA-256 is a foundational element in the encryption used by consumers & business
- But for government, disclosing a crack to a ubiquitous standard that they previously discovered (or designed) would destroy a covert surveillance mechanism—because the market would move quickly to replace the compromised methodology.
I understand why DuPont would boast of an impressive technical feat. Cracking AES, SSL or SHA-256 has become an international contest with bragging rights. But, I cannot imagine a reason to wait one year before disclosing the achievement. This, alone, does not create a conundrum. Perhaps DuPont was truly concerned that it would undermine trust in everyday communications, financial transactions and identity/access verification…
But retracting the claim immediately after disclosing it makes no sense at all. There is only one rational explanation. The original claim undermines the interests of some entity that has the power or influence to demand a retraction. It’s difficult to look at this any other way.
What about the everyday business of TS DuPont?
If the purpose of the original announcement was to generate press for DuPont’s financial services, then they have succeeded. An old axiom says that any press is good press. In this case, I don’t think so! Despite the potential for increased name recognition (Who knew that any DuPont was into brokerage & financial services?) I am not likely to think positively of TS DuPont for my investment needs.
* The cryptographic community could not challenge DuPont’s original claim, because it was not accompanied by any explanation of tools, experimental technique or mathematical methodology. Recognizing that SHA-256 is baked into the global infrastructure banking, of commerce and communications, their opaque announcement was designed to protect the economy. Thank you, Mr. DuPont, for being so noble!
Philip Raymond co-chairs CRYPSA, hosts the Bitcoin Event and is keynote speaker at Cryptocurrency Conferences. He is a top writer at Quora.
PARIS — The European Union’s equivalent of a foreign ministry is starting a new effort to promote the need for sustainable space operations, but that effort will not initially include any new regulation of European satellite operators.
Carine Claeys, special envoy for space and head of the Space Task Force for the European External Action Service, said in a Sept. 13 panel discussion at Euroconsult’s World Satellite Business Week that the Safety, Security and Sustainability of Outer Space (3SOS) public diplomacy initiative will promote “ethical conduct” in space amid concerns about orbital debris.
The acronym, she noted, has a second meaning. “It is also three times SOS,” she said, “to create the case and a sense of urgency.”
Bitcoin and cryptocurrency adoption has failed to live up to expectations over recent years and fears around scams, fraud, and theft have not helped.
The bitcoin price, after its epic 2017 bull run, slumped last year– though has rebounded in 2019, climbing back above $10,000 per bitcoin.
Now, researchers have warned a staggering four out of the first five results returned when asking Google for a “bitcoin qr generator” led to scam websites–potentially furthering negative public perception around bitcoin and cryptocurrency.
Would you consent to a surveillance system that watches without video and listens without sound?
If your knee-jerk reaction is “no!”, then “huh?” I’m with you. In a new paper in Applied Physics Letters, a Chinese team is wading into the complicated balance between privacy and safety with computers that can echolocate. By training AI to sift through signals from arrays of acoustic sensors, the system can gradually learn to parse your movements—standing, sitting, falling—using only ultrasonic sound.
To study author Dr. Xinhua Guo at the Wuhan University of Technology, the system may be more palatable to privacy advocates than security cameras. Because it relies on ultrasonic waves—the type that bats use to navigate dark spaces—it doesn’t capture video or audio. It’ll track your body position, but not you per se.
Computer vision is one of the most popular applications of artificial intelligence. Image classification, object detection and object segmentation are some of the use cases of computer vision-based AI. These techniques are used in a variety of consumer and industrial scenarios. From face recognition-based user authentication to inventory tracking in warehouses to vehicle detection on roads, computer vision is becoming an integral part of next-generation applications.
Computer vision uses advanced neural networks and deep learning algorithms such as Convolutional Neural Networks (CNN), Single Shot Multibox Detector (SSD) and Generative Adversarial Networks (GAN). Applying these algorithms requires a thorough understanding of neural network architecture, advanced mathematics and image processing techniques. For an average ML developer, CNN remains to be a complex branch of AI.
Apart from the knowledge and understanding of algorithms, CNNs demand high end, expensive infrastructure for training the models, which is out of reach for most of the developers.
When practical quantum computing finally arrives, it will have the power to crack the standard digital codes that safeguard online privacy and security for governments, corporations, and virtually everyone who uses the Internet. That’s why a U.S. government agency has challenged researchers to develop a new generation of quantum-resistant cryptographic algorithms.
Many experts don ’t expect a quantum computer capable of performing the complex calculations required to crack modern cryptography standards to become a reality within the next 10 years. But the U.S. National Institute of Standards and Technology (NIST) wants to stay ahead by getting new cryptographic standards ready by 2022. The agency is overseeing the second phase of its Post-Quantum Cryptography Standardization Process to narrow down the best candidates for quantum-resistant algorithms that can replace modern cryptography.
“Currently intractable computational problems that protect widely-deployed cryptosystems, such as RSA and Elliptic Curve-based schemes, are expected to become solvable,” says Rafael Misoczki, a cryptographer at the Intel Corporation and a member of two teams (named Bike and Classic McEliece) involved in the NIST process. “This means that quantum computers have the potential to eventually break most secure communications on the planet.”
CloudMinds is leading the AI transformation in the real estate industry — boosting the effort to create more Smart Communities
Posted in business, information science, internet, robotics/AI, security | Leave a Comment on CloudMinds is leading the AI transformation in the real estate industry — boosting the effort to create more Smart Communities
BEIJING, April 26, 2019 /PRNewswire/ — The real estate industry is accelerating its transformation from building development to community operation. Today, with the rapid development of 5G and artificial intelligence technology, real estate developers are focusing on diversified business transitions. Creating smart communities by introducing innovative technologies such as big data and artificial intelligence into the development and operation of real estate projects. A real estate developer in China and the cloud intelligent robot operator CloudMinds signed a cooperation agreement, and CloudMinds will provide hundreds of cloud intelligent robots to help the customer build a new generation of smart communities.
CloudMinds is the world’s first cloud intelligent robot operator, and has been committed to the implementation of artificial intelligence technology using robots and all types of smart devices. Utilizing the leading cloud intelligent robot solution, CloudMinds built a smart cloud platform based on HARIX architecture for the customer and will offer variety of services including smart building, smart security, smart property management etc. CloudMinds’ full range of intelligent robots are also deployed in many scenarios such as hospitality, reception, security, patrol, smart doorman etc.