May 13, 2015

3D tech brings big data analytics to crime scene investigations
The traditional method of crime scene reconstruction and evidence gathering involves an initial walkthrough and photo documentation. In the course of this investigation, it is critical not to remove or move items at the scene, because any disturbance can call the evidence's validity into question; the evidence must be accepted as tamper proof in order to be authenticated and admitted in court. It's not easy to do. Investigators and forensics experts use total stations, which are portable crime scene mapping units that combine software, hardware, and data collecting sensors into an integrated mapper that records and maps evidence data points. 3D laser scanning technology is providing crime scene investigators with new analytics capabilities.


How Corporate Culture Impedes Data Innovation
Companies able to realize the most benefit from their data are aligning their visions, corporate mindsets, performance measurement, and incentives to effect widespread cultural change. They are also more transparent than similar organizations, meaning that a wide range of personnel has visibility into the same data, and data is commonly shared among departments, or even across the entire enterprise. "Transparency doesn't come naturally," Gilbert said. "Companies don't tend to share information as much as they should." Encouraging exploration is also key. Companies that give data access to more executives, managers, and employees than they did in the past have to also remove limits that may be driven by old habits. For example, some businesses discourage employees from exploring the data and sharing their original observations.


Web-Based Transient Detection Can Enhance Data Center Electrical System
Implementing a web-based transient detection monitoring system can contribute to more effective management of the electrical system. By combining surge suppression hardware and dedicated software that proactively monitors and measures the data center’s electrical system, it can provide a way to detect the occurrence of abnormal power quality events. This provides knowledge about data center management that can be used to predict and address potential problems before they happen. The combined technology goes beyond what is typically available with standard power meters. This type of advanced transient detection system can give the ability to monitor RMS voltage real-time at every connected panel.


Peering Into Computing’s Exascale Future with the IEEE
There is no shortage of “lunatic fringe” computer architectures. What is lacking, Conte and others assert, is the willingness to risk a fundamental overhaul in order to transform computing. It will take a public-private partnership, the IEEE group maintains. Along with the “Three Pillars” of energy efficiency, new user interfaces and “dynamic security,” the list of possible computing approaches ranges from “neuromorphic” and “approximate” computing to adiabatic, or “reversible,” computing to variations on parallelism. Quantum computing, which has attracted much investment, shows promise, Conte agreed. “It’s going to have it’s own niche,” he added, “its own node in the cloud. But it’s not low power.” A more promising approach, one Conte thinks could fundamentally transform computing, is HP Labs’ “The Machine.”


Cyber Attacks on News Organizations: ISIS Changes Tactics to Win Mindshare
Newsrooms are inherently vulnerable as they do not house strong teams of Information Security personnel, nor do they generally possess the world-class tools and architectures needed to defend against sophisticated cyber-attacks. A typical network security tool newsrooms have is perimeter protection, a technology that is an eroding concept. They need to review the impact of today’s standard application security approaches, such as the growing use of cloud technology that can help protect against top-level attacks such as advanced persistent threats, intrusions, distributed denial of service (DDoS) and other forms of highly technical attacks. To properly defend themselves, newsrooms need to implement a much more robust security fabric with higher levels or processes and security.


The rise of the Internet police
The policing requires human intervention because Facebook's systems are only trained to spot and automatically eliminate images showing child exploitation. For everything else, Facebook's teams wait for alerts to come to them. Users can register complaints and call out spam, harassment, hate speech or sexually explicit content. Because it only takes two clicks to begin a report, users frequently point out bad behavior. "It's one of the reasons we make it so easy to report," says Silver. Facebook processes about 1 million legitimate complaints every week -- a sliver of the site's posts. It's not perfect, and the company doesn't identify everything. "It's hard, and at scale, it's impossible," says Danielle Citron, a law professor at the University of Maryland and author of "Hate Crimes in Cyberspace."


Gordon Moore is still amazed at how Moore's Law shaped the tech industry
“The fact that something has gone on for 50 years is truly amazing,” Moore said. Friedman tried to get Moore to predict when the law would run out of steam, but the most Moore would allow is that it could go on for possibly another five years. Moore said he was amazed at how the advances in computing had spawned offshoots from free Internet services to self-driving cars. Though he was the chief technical officer of Intel when he submitted his predictions to Electronics, Moore said he was trained as a chemist, not as a futurist. ‘We’ve just seen the beginning of what computers are going to do for us,” Moore said.  “We’re seeing an evolution in the intelligence of machines,” Moore said. “This is not happening in one step, but in a whole bunch of increments. I never thought I’d see autonomous cars driving down the freeway.”


5 Secrets to DevOps Success
‘BMI’ is one metric used to track your adoption to a good balance in life. Likewise, assessing your adoption of DevOps practices can be a good metric to tracking the proper balance in IT. In light of the challenges that many organizational are facing to achieve the right balance of DevOps, IDC recently released a survey that tracks progress of and barriers to implementing DevOps. They found that IT teams advanced with DevOps adoption in different dimensions at different times: people, culture, technology, business and process. While the people, technology, and process elements evolved along a common trajectory, the culture and business sides prove to be more complex. When implementing DevOps practices and guiding teams to automate incident management, there are five major areas that IT leaders should consider to make sure the right balance is achieved between business needs and cultural development:


Everything you need to know about iCloud Drive
Accessing iCloud Drive on iOS has to be done through individual apps. To open a file from iCloud, you must first tap the icon for the compatible app, such as Pages or Keynote. Within the app, tap the + icon and then tap iCloud. A window will open displaying the contents of your iCloud Drive. Tap the icon of the folder that contains the file you want to access and tap the file name. A copy of the file will then open in the app on your iOS device. If you want to send a file to iCloud from your iOS device start with the file you want to send and tap the Share icon (the one that looks like a box with an arrow coming out of it). Tap "Send a Copy" and select the file type you want to export it as. Then tap "iCloud Drive" and tap the name of the folder you want to save it to. When prompted tap "Export to this location" and your file will be saved to iCloud Drive.


Software detects fake mobile, Wi-Fi networks
A technically skilled person could probably build a fake cellular tower for around $350, while a non-technical person could assemble one for around $1,500, Liwer said. For enterprises with sensitive data, the lower barrier to intercepting mobile communications poses yet another risk to data. CoroNet’s software is a lightweight agent that runs on an Android or iOS device or on a laptop. It is programmed to detect behaviors and characteristics of a base station, as well as those of Wi-Fi networks. It turns out that fake ones leave a lot of clues that they’re probably bogus. ... “Based on that pattern, we know that is probably suspicious behavior,” Liwer said. “A safe network would never behave this way.” If a mobile network looks suspicious, CoroNet can cut off the connection to the fake base station and route the call to the legitimate one.



Quote for the day:

“Some men see things as they are and say "why." I dream things that never were and say "why not.” -- Robert F. Kennedy

No comments:

Post a Comment