The IBM supercomputer Watson was famously put to the test a few years ago when it took on all comers and destroyed the competition on the TV game show Jeopardy. But when it comes down to the computing difficulty is pretty linear in its reasoning. What I mean is that it operates the way any of your voice command systems work such as Siri for the Apple system. Essentially a combination of words are searched in conjunction with one another and the system finds reverent combinations and derives a conclusion based on statistical prevalence. This is great for the kind of thinking you want out of Jeopardy, essentially you try to make yourself as computer like as possible and recall facts and bits of linguistic significance with little to no display of your understanding of the topic at hand. This lacks a fundamental component we consider when determining the necessary conditions for defining sentient and more importantly intelligence. This technology could also fundamentally change the way to get media.
Thus the next frontier for IBM is to make Watson have an “original thought” essentially, they want Watson to come up with something they did not program into him as such. Chairman Brown has said that “IBM is an industrial research lab – dedicated to innovate invent, and push the state of the art tech. We do basic research and have a real products and solutions that can benefit Society in general.”
Brown reminded us that in 2004 America watched as Ken Jennings racked up a record 74 game winning streak. That’s what motivated him to push the Watson project into over drive. This is because he knew he could do it, and do it better. The way he was going to do it was basically right the book on natural language processing. Then it ran 8,000 models and test simulations over the course of a few years then they were ready.
He then offered this bit of advice for the high school audience, “A public service announcement, anything you put on the internet. Snapchat, Facebook stay on there. Employers might look at that.” This is worrisome considering his plans to make the Watson super computer an intelligence that would exceed the human potential. In essence he wants to pluck something right out of the pages of science fiction, and create an Ultron like super mind that has no consideration of empathy or respect for human life. If you think about it, it may be wise to try to ensure this before long. Because, it is one thing to have sentient computers without a sense of morality because they could affect our internet lives or vital infrastructure if compromised. The truth is that computers at the end of they day no matter how smart are still at the control or at least harm of mans influence. With this trend reaching the military, we must give pause and wonder what the priorities of the tech sector should be and whose running this ship. The Watson system may have some applications that are extremely beneficial to human en devours, but we should has that out concretely rather than making it and seeing what happens.0
Consumers have turn to ad blocker to to avoid the incessant advertising on their mobile phones and personal computers. They know that marketers and content providers depend on their pitch to pay the bills and are looking frantically for lays to counter the program that is beginning to meet its match. BlockIQ, which is owned by AdSupply, has recently merged with Adaptive Medias, begain to launch BlockBypass. This is a software that can. This software can detect when a users of the popular ad blocker AdBlock and perform a myriad of counter blocking maneuvers, which are all geared to the attainment of the ultimate goal: AdBlock aversion. The way we compute is being influenced by the Government everyday with the passage of new legislation.
“the incredible growth of ad blocking has reached the tipping point where sites will no longer be able to operate BlockIQ CEO Justin Bunnell said.
over the last year alone, there has been use of ad blockers on the rise to the tune of 41 percent globally. this brings the number of world wide users to an estimated 198 million, which costs publishers an estimated $22 million in the US alone, this coming from a PageFair’s 2015 global ad-blocking report.
“if ad blocking continues unchecked, it will eliminate the advertising revenue websites need to survive,” Bunnell adds. “it is like expecting a movie theater to stay in business when 30 percent of their audience doesn’t pay for a ticket.”
The thing which is ironic is that marketers have noted that ad blockers not only cost them in terms of publishers revenues, but they themselves squeeze money from advertisers and are guilty of the very same. Ad blockers are little extortionists themselves when it comes to getting a pretty penny from the advertisers. “the big ad-blocking companies will whitelist an advertiser’s ads if they pay a fee. If you don’t pay them, they’ll block your adds,” he added “we don’t think that’s a fair situation at all, and our technology defeats it,” he said confidently.
Eyeo is the maker of the most used ad bokcker, Adblock Plus, which has been taking payments for years for companies, which include the big ones like Google and Microsoft.
This is an interesting time to be in the internet business. On one hand we do not want ads on our computers, but what we don’t realize is that what we want even more than that is really high quality content on the internet. We are constantly reaping the benefits of the money used to produce the high content of the internet because advertisers assume their adverting dollars are being seen by consumers. What we are beginning to see is that advertisers are pulling their money and thus the quality is beginning to drop.
I do not want to say that we must submit to being constantly inundated with advertising as the only way to justify our using the internet, I think there has to be a middle ground. Like anything else I think you should be able to use our dollar to dictate the level of you comfort. What I am getting at is that there should be a way to pay to have the ads not reach you that still pays the content generators and ensures that you are not going through a back door and taking money from their pockets.
The encryption battle that waged between FBI and Apple has already become the news of yesterday, yet it seems that few sides have shared their opinions over what the high-profile and unprecedented legal and technological situation and conclusion might imply for the future of government surveillance, privacy rights, and public access to strong encryption.
First, let’s go over the facts: After the tragic San Bernardino terrorist attack, the FBI acquired an iPhone belonging to one of the shooters. The iPhone was locked and required a password to be opened. The FBI wanted to open the phone to see if they could find any further information regarding the suspect and any recruiting methods or other criminals involved in the event.
Accordingly, the FBI requested that Apple help the FBI break into the phone. Apple has cooperated with different kinds of requests of this nature, in which Apple is requested to give information about the user of the phone for the sake of national security.
However, this case was distinctly different; the government didn’t just want the information that Apple already had to offer. It wanted Apple to create an entirely new software for the government that would act as a backdoor to the encryption that comes with every iPhone. The software could be used for the government to hack into the phone.
The government claimed to have the right to request this of Apple due to a law called the All Writ’s Law, which is over two centuries old and was actually signed into action by George Washington himself. Written when the country was still nascent and had yet to develop its judicial system, much less the wide variety of laws that would become necessary to maintain order and consistency in a nation, the All Writ’s Law acted as a bypassing of legal system when a timely situation involved a context that the legal system hadn’t adequately outlined. Accordingly, the FBI and other government agencies could issue demands that had the authority of law without any laws themselves being relevant to the demands.
Apple was having none of it. Its CEO, Tim Cook, wrote open letters and was very public about his denial of the government’s authority to force Apple engineers to write code for anything. Cook claimed that the All Writ’s Law was bunk and that no government authority had the authority to force a company to create a product that weakened its own product’s value. He also believed that reducing the encryption capabilities of his products would make consumers more at risk for cyberattacks from cybercriminals, not to mention the government would be able to carry out its largely un-monitored surveillance that much easier.
Even UN Commissioners started to pitch in, stating that encryption was an important resource for political dissidents in authoritarian countries whose governments would execute any identified nay-sayers.
The government eventually backed down and closed the case, stating that it had already found its own way to crack into the phone so it no longer needed Apple’s help.
What’s strange about this is that the government had the power to do what was seen as an offense to human rights all along, and did it legally, and announced it. So was there truly a victory for Apple and human rights? Probably not.0
Last week, USA Today announced the development of a virtual reality program set to evolve in tandem with the VR sector. The program is set to be relerased in Spring and will be titled VRtually There.
According to the USA Today Network (owned by Gannett), VRtually There plans to move forward with a network approach and will contain its own set of regularly scheduled programming.
USA Today spokesperson Amber Allman stated that the new program will take its news from the USA Today Network’s same news rooms, but deliver the news on a VR platform.
“We will promote the show through our multiplatform USA Today Network, which is comprised of our national brand, USA Today, and 92 local news brands- all of our websiets, mobile applications and newspapers- on a regular basis,” she explained.
VRtually There will broadcast its music news from a newsroom in Nashville, Tennessee; its sports from Indianapolis and Detroit; its outdoor living channel from Reno, Nevada and Fort Collins, Coloragao; its tech coverage from newsrooms based in Los Angeles and San Francisco; its finance reports from Westchester, New York; its consumer tips from Reviewed.com; and its politics and government briefs from Washington D.C.
VR stands apart from all other existing platforms in that it offers a 360-degree, 3D view for watchers and listeners. VRtually There will offer 360-degree videos on desktop displays, smartphones and tablets along with headsets made for virtual reality viewing like the Oculus Rift and HTC’s Vive.
“We will also feature a comprehensive tutorial for first-time users explaining VR- for our show and our other VR content- as well as how to use it,” stated Allman. “Additionally, we intend to pr omote in other news platforms and at industry and consumer events.”
Whether VRtually There will utilize an autoplay playlist or allow users to create their own playlists remains unclear.
“This is part of the adventure of storytelling in a new medium,” explained Allman. “We will test and learn on an ongoing basis to determine if features like autoplay, the concept of a playlist, or even simpler ideas like lower-thirds graphic make sense on a 360-degree canvas.”
A huge amount of research remains undone regarding the successful implementation and management of VR online experiences. In fact, VR has gone so untouched by the mainstream that attempts to incorporate it into standard products like news programs threaten to destabilize the entire industry.
“A poorly received user experience could impact negatively the adoption of VR,” Larry Chiagouris stated regarding USA Today‘s announcement. Chiagouris is a current professor of marketing at Pace University’s Lubin School of Business.
“The most important contributing factor to the success of VR is creating as realistic an experience as possible,” he continued. “In the early stages, if an inexpensive means negatively impacts the user experience, that will do more harm than good to the adoption of VR.” For this reason, some VR enthusiasts were worried by the development of Google Cardboard, an extremely inexpensive but low-quality product offering VR to the masses.0
The UK Parliament recently drafted the Investigatory Powers Bill, a piece of legislation that would overhaul rules on how authorities access the communications of British citizens.
The wording of the bill has concerned a variety of tech companies, especially those affiliated with social media like Facebook, Google, Twitter, Yahoo, and even Microsoft. Apple has already challenged the reach of the draft’s legislation.
The aforementioned five firms are united in a coalition called Reform Government Surveillance or RGS. RGS hopes to promote principles and make legal arguments that curtail the governments’ increasing power to collect communications data on their citizens.
“There are many aspects of the bill which we believe remain opaque,” asserted the RGS companies in their written evidence. The RGS has pointed out wording related to judicial authorization, encryption and technical requirements on tech firms that is vague to the point of being potentially exploited.
The government bill take issues with tech companies that offer end-to-end encryption services for customers like the messaging app in Apple’s iPhones. The encryption makes decoding messages extremely difficult and time-consuming, even for Apple engineers. The bill would allow for encryption to take place, but also make it possible for the government to force firms to give up the decryption keys.
Apple has been the frontrunner in fighting this effort, stating “We reject any proposals that would require companies to deliberately weaken the security of their products via backdoors, forced decryption, or any other means.”
The creation of backdoors would also allow for increased government surveillance, though Apple also points out that third party malicious hackers can and will also exploit any vulnerabilities that they build into their products.
Another facet of the debate is the issue of extraterritorial jurisdiction; authorities are unsure the extent to which UK authorities can compel US based companies to comply with their laws.
“We have collective experience around the world of personnel who have nothing to do with the data sought being arrested or intimidated in an attempt to force an overseas corporation to disclose user information,” stated the RGS firms. “We do not believe that the UK wants to legitimize this lawless and heavy-handed practice.”
The polite reminder of this totalitarian-regime-like movement of more “advanced” nations like the UK and US in terms of increased government surveillance has been a repeated motif amid the privacy vs. security debate.
The tech firms seem determined to use their economic power to fight this trend in government surveillance, to the relief and accolade of privacy advocates.
“As a general rule, users should be informed when the government seeks access to account data, ” the firm asserted. “It is important both in terms of transparency, as well as affording users the right to protect their own legal right.”
The role that tech firms are playing in government surveillance issues has been truly remarkable, according to Paul Bernal, legal expert at the University of East Anglia.
“I think it’s very interesting how strongly the ‘big players’ of the internet have responded to the UK government’s surveillance plans. The breadth of the intervention is remarkable- they haven’t kept to purely technical matters, but talk about judicial authorization, transparency and so forth. The breadth shows how seriously they are taking the issue.”0
The internet is an open and public system; we all send and receive information over shared wires and connections. Even though it’s an open system, we still share a lot of private data like bank information, passwords, credit card numbers, social security numbers, etc. How do we keep all of that private during such a public exchange of information?
Through encryption. Data of any kind can be kept secret by scrambling or changing a message to hide text. Decryption is the process of unscrambling the message to make it readable. This is pretty simple, and people have been doing it for centuries.
How do you make sure encryption is difficult? You use a method of scrambling or changing information that’s not necessarily difficult to decode by the intended reader, but would take forever to figure out for an unintended reader.
The power of modern computer processing has significantly upped the challenge for both encrypters and snoopers. Anyone with a message they want secured has to create a code that would be too hard to crack in a reasonable amount of time. Today’s secure encryptions use 256 bit keys, which makes for an extremely long and challenging amount of keys to try before potentially finding the right one. Even with 100,000 super computers, it would take trillions of years to crack that kind of code.
Just to be clear, the key is the pattern that allows a reader to unlock the original message.
When the sender and the receiver share the same key to encrypt and decrypt a message, it’s called symmetric encryption. With symmetric encryption, the secret key has to be agreed upon by two people in private.
This isn’t possible with computers, which never meet in private. Therefore, they utilize asymmetric encryption. That means there’s a public key that can be exchanged with anyone and a private key that is shared with no one.
The public key is used to encrypt data and can be used by anyone. However, the secret can only be decrypted by a computer with access to the private key. Imagine you have a personal mailbox where anyone can deposit mail, but they need a key to access your deposit slot. However, only you can open your mailbox entirely to remove messages because only you have the private key. This way, people can exchange secure messages without ever needing to agree on a private key.
The security protocols SSL (Secure Sockets Layer) and TLS (Transport Layer Security) both use these methods to secure data on the web.
Your computer uses either of these services anytime you see the lock next to the URL (Uniform Resource Locator) in your browser, or anytime you see that the website listed after “https”.
As the internet grows, the amount of secured data flowing from one device to the next only increases. The need to secure that data will, accordingly, increase in importance. As computers develop faster and faster, new ways will have to be discovered to make encryption harder to break.0
This is the perfect time for the PC enthusiasts. So lot existing technologies upgraded into a next generation & also the new technologies introduced. But knowing if to upgrade the PC into a latest & also greatest will be the critical decision. Must you purchase now or you wait for a more advanced tech which promised by like of the AMD, Intel and the others? For the power users, lots of the information technology professionals fall in this category and also waiting for the specific tech will have the wider impact on the future productivity as well as to the ultimate success. Let see the Recent technologies in Personal Computer. The USB devices are the ubiquitous, so this is only the natural to need to know a lot about a successor to the USB 2.0. The USB 3.0 raises an effective data transfer rate by the factor of greater than the six, a large improvement over the USB 2.0. This gives a lot power than the USB 2.0 when the devices requires this, and 4.5 Watts versus a 2.5 watts, and less if they do not. The USB 3.0 available as the chip added into a motherboard or through the add in a card. The AMD supports the USB 3.0 natively & also Intel announced the plans to support the USB 3.0 in the seven series Panther Point chip sets.
Intel Thunderbolt, with Apple, developed the tech to compete along with the USB called as Thunderbolt and although the Intel prefers to Thunderolt as a coexisting along with the USB. And originally code named ‘light peak’ & also making use of the optical cables, the Thunderbolt is the copper based and permitting for the ten watts of the power over a copper. The Thunderbolt combines the PCI express & also DisplayPort protocols to one shared interface. And there is the quite the bit of the confusion about a total bandwidth of the Thunderbolt port. Also, according to the Intel tech Brief, the Thundernolt connector capable of giving the two full duplex channels. Every channel gives the Bi directional 10Gbps of the bandwidth. The Intel spokesman had explained that this way in the PC magazine. Most of the customer storage devices do not come anywhere near a 10Gb per second data rate, but this is alternating along with a faster SSD & also flash drives being produced. Up to 7 total devices will be daily chained to use a remaining 20 GB per second per direction full bandwidth. This speed comes at the price.the 2.0 meter copper based Thunderbolt cable price 49 dollars USD,accost due to a Gennum GN2033 controllers & the other electronics built into each and every end of a cable which performs a data moving & multiplexing magic. These are some of the Recent technologies in Personal Computer, so see this and then satisfy your needs. If you want to more details then this is the right page for you, so please keep in touch with this right page.0
HDMI is also known as High-Definition Multimedia Interface. These connections send sharp and clear digital video and audio via one cable, helping keep the clutter away in the living room. Now it’s just about choosing the correct one. There are multiple version of HDMI, the most recent of them being HDMI 2.0.
The perfect digital interface provided by HDMI is the finest way to connect HD devices and components. Such things as Blu-Ray players, HD satellite, cable boxes, PlayStation and Xbox are all compatible with HDMI TVs and audio receivers. Sure there are other ways to connect, but why let your visual and audio quality suffer? In fact, for many devices, the only way to make an HD-compatible connection will be with HDMI. There are plenty of TVs that still tout a component input, but its nearly extinct on Blu-ray players these days.
While offering multichannel audio and HD video through one cable in something uniquely HDMI, these interfaces have other advantages as well. Since the information that HDMI connections create are strictly binary (1’s and 0’s), this eliminates the common issue of compromising the video and audio quality when you convert digital to analog. It also supports 1080p, which is necessary for HD TVs. Not to mention that it finally supports 8 channels of high-quality 24-bit 192kHz audio. It’s the only input/output that can carry 3D signals, and HDMI 1.4 and up can carry an internet connection between devices that are compatible.
Another interesting aspect of HDMI is that provides copy protection. This is less of a concern for the average consumer, but movie studios can greatly benefit from it. It affects the quality of what we are watching, and will continue to do so even in the future. One of the reasons why it was so readily adopted is because of the demands of studio-professionals for better copy protection against piracy. High-Bandwidth Digital Content Protection (also known as HDCP), presents itself on essentially all HDMI enabled devices. Without HDCP, the quality and the amount of HD content presented to consumers would be significantly more limited. The downside is that it also authenticates the connection between components through a digital maneuver known as a “digital handshake”. Occasionally, problems can arise from this process and degrade the quality of the picture and audio.
As of now, HDMI is a universally used connector for the home entertainment system. Of course, it is continuously evolving to the meet the upgrades that occur with electrical equipment and sound systems. HDMI, thankfully, is completely backwards compatible, and with the use of an adapter can even be used with DVI (video only, no audio). HDMI automatically selects the highest quality of the audio or video formats that are jointly supported by the two components. Essentially, if one of your devices is HDMI 1.2 and the other is HDMI 1.3, the result will be limited to 1.2 standards. There are 7 versions of HDMI, and the only one you’ll have to ever worry about will most likely be 2.0, as the updates and features it has are only accessible with an HDMI 2.0 component.0
What are smart phones and why are they called so? First of all, to answer this question, we will have to analyze in detail the way in which the mobile network has filtered into the human life and slowly encircled all of us entirely in its complicated web.
The first form of communication that man succeeded in inventing was the telephone, for which Graham Bell takes credit. But it did not become an immediate hit due to its prices. But slowly, with advancement and newer versions trying to take the place of the former ones, people started buying, believing and ultimately depending on it.
How smart are Smart phones?
After the advent of telephones, for long, nothing else could take its place. Then came the cellular phones. It created such a blast in the communication industry. Nobody could even have imagined the possibility of its reach that it had on the people from the minute of its release into the market. The orders were coming in like crazy, sales surging up, and in no time at all, all the phones manufactured for the first round vanished. Then, slowly and steadily it started to pick up an even more vigorous pace and has now brought us into the age of smart phones.
What do you think is possible with smart phones? With Smartphones, you can learn languages, call people, video chat, connect to internet, find out routes in real time, and get back your lost mobiles as well as sim cards. You no longer need to hang outside the mobile showroom, waiting to block your sim card or get your insurance money for your lost phone, because now with the latest, Anti-theft technology, the smart phone will not only show you where the phone is, but also intimate another person about its whereabouts. So, with such a massive intellectual device in our hands, we only need to take care that it is never exploited!0
More than a play station, Xbox One or rather Xone, how it is commonly known as, can be categorized as a video game console. When it was first introduced, people were doubtful about it and even the manufacturing company was apprehensive about its success and the nature of welcome among the customers.
But just within six months after its entry, all these doubts and concerns were cleared when the sales suddenly surged and began booming. All these credit goes to the Americans because Xbox was first introduced in the American markets and then across Europe, Australia and New Zealand. And very recently, even the Indian markets have started picking up the pace.
The craze and the Justification
Long gone are the days when kids used to go outside to get some fresh air or play. Now, all they do is immerse their noses into some electronic gadget. Such has become the advancement in technology that they drag the kids’ attention from the outside to indoors completely. In some ways this is good, but not always, because, human body does need some physical activity apart from the exercise that we give to the brain. This can be achieved through some form of sports or running.
The amazing news is that all this is possible through Xbox One. Don’t be surprised, for all this is true and that is how Xbox One became a hit in the market. Xbox One, the video console not only offers video games for the mind, but also offers the chance of playing physically. This is possible because it creates a virtual console with the Xbox and the player can play physically while the other player (Xbox) creates a visual illusion of someone playing with us.
Thus, Xbox One has proved that with the advent in technology, it is not always necessary that one has to become a lazy bag, but he or she can also develop their physical as well as mental strength.0