Skip to main content

Home/ CSIA 459/ Group items tagged Technology

Rss Feed Group items tagged

Percy Kendrick

What will IT be like in 50 years? - 0 views

  •  
    This video gives an example of technologies of the future and a different way to pose questions for how technology can improve daily life but also where technology can take us.
  • ...1 more comment...
  •  
    I really like the way they talked about complete integration in the video, as that definitely seems to be the direction that everything is going. Forget about dedicated devices, everything from your couch to your car, to your refrigerator will have intense computing power, and will be able to communicate with you and everything else around you to better your life. The only downfall I see of this is it seems like people would forget how to not use technology, and would be completely helpless if it was lost.
  •  
    Complete integration is really important. It is a focus of many technological advancements. This is due to the fact that people want technology that makes life as whole easier not just individual tasks. I am eager to see what technologies the future will actually hold!
  •  
    Interesting assessments by the individuals in that provided video Percy. I personally keyed into the statement that technology will operate in a more conversational (social) manner that's similar to how humans interact. The further technological-based assessments are interesting especially with regard to gene mapping and what diseases somebody may face within their lifetime.
Funsho Aiyedogbon

5 Emerging Technologies Every Office Will Have In 2020 - 1 views

  •  
    This article explores five emerging technologies that will be commonly used in business offices in the next seven years.
  • ...1 more comment...
  •  
    Now this is scary and yet so amazing. The fact that they are already predicting that typing a password into a device is something that is going to be in the past, is unreal. A device is going to recognize your face and allow you to have access to it. The scary part is the phone aspect in how the devices will pick up your phone conversation and automatically send a calendar invite to your device. New technologies are definitely amazing but still, there is little to no talk on how they are going to secure the environments that they are creating.
  •  
    Very interesting article. Basically, all human existence will be completely gone by 2020. I can't believe these technologies even exist and are currently in the prototype stage. You never know, this technology can take over sooner that what this article expect. The most interesting technology to me the use of sensors. If things come out to be in full effect, with the use of these sensors can provide very accurate data and help avoid the use of any fraudulent it identity threats. Thanks!
  •  
    I read this article and loved it. After reading it a while back I became very interested in Gesture Control. This is the emerging technology that I chose for this class. I know that this article talks about the use of this technology in the office but we have already seen it in Smartphones (the new Galaxy) who knows where it will pop up next!
Phil Kemp

Massive casino scam pulled off via CCTV system compromise - 4 views

  •  
    While society is looking to use technology for it's benefits, there are many pitfalls, and adverse uses for this same technology. This article discusses how the use of CCTV systems for ensuring that players do not cheat was used against the same system, to do the very thing it was protecting against. We as technology professionals should be very congnizant of the security risks that the technology we recommend or put in place, may have alternate uses, which may be used against us, and thereby causing more damage than it helped to protect.
  • ...3 more comments...
  •  
    Good article and I like the site. Haven't been there before. Looks like a good site to find out current news articles for another class I'm taking. Thanks!
  •  
    I read about the scam shortly after it happened, but the article I read didn't provide nearly as many details. Thanks for the article and I think there might be more people unemployed than just the VIP services manager.
  •  
    Phil you are so right about an organization own security technology being used against them. This is a great example of that. It is important when implementing technology to fully analyze its impact, that includes vulnerabilities and threats. A good change managment policy can help reveal problems like this. I wonder if there was an insider involved or maybe the casino failed to properly protect the network.
  •  
    Phil, This is very interesting. You would have thought the casino would have better security than that on their system. It also suprises me that if you were in a game with that much money why did they not see the receiver the person had. A simple pat down could have reveiled it. It is scary what technology can do in the wrong hands. Lee
  •  
    Winning is one thing, but stacking the deck is another. I would have thought that a casino would have a better way of securing their systems. Ben
Amy Harding

U.S. business groups worried by cybersecurity law aimed at China | Reuters - 0 views

  •  
    This article talks about buying technology products from China and whether the US should. The supply chain is an important part of emerging technologies. As you worked on your bibliography - did you question where the technology comes from?
Shondre Fort

Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - 0 views

  • Schlenoff and his colleagues used their SCORE approach to evaluate technologies as they progressed under two DARPA programs: ASSIST and TRANSTAC. In ASSIST, DARPA is funding efforts to instrument soldiers with wearable sensors—video cameras, microphones, global positioning devices and more—to continuously record activities while they are on a mission. TRANSTAC is driving the development of two-way speech-translation systems that enable speakers of different languages to communicate with each other in real-world situations, without an interpreter. By providing constructive feedback on system capabilities, the SCORE evaluative framework helps to drive innovation and performance improvements.
  •  
    SCORE (System, Component and Operationally Relevant Evaluations) is a unified set of criteria and software tools for defining a performance evaluation approach for complex intelligent systems. It provides a comprehensive evaluation blueprint that assesses the technical performance of a system and its components through isolating and changing variables as well as capturing end-user utility of the system in realistic use-case environments. The SCORE framework has proven to be widely-applicable in nature and equally relevant to technologies ranging from manufacturing to military systems. It has been applied to the evaluation of technologies in DARPA programs that range from soldier-worn sensor on patrol to speech-to-speech translation systems. It is also currently being applied to the assessing the control of autonomous vehicles on a shop floor.
  •  
    From NIST Tech Beat: June 21, 2011 Most industry executives, military planners, research managers or venture capitalists charged with assessing the potential of an R&D project probably are familiar with the wry twist on Arthur C. Clarke's third law*: "Any sufficiently advanced technology is indistinguishable from a rigged demo."
Shondre Fort

Gestures are taking control - 0 views

  •  
    The author of this article presents the anticipated growth of gesture control technology. It is already used in Smart phones; however, the author presented information about the expansion of this technology to laptop and personal computers. The author presented how this technology has developed presenting that the beginning formation of this technology has been seen in gaming systems that allow the user to use their body movements to control their avatar. Australian researchers are developing similar technology to be used to control the television.
Gilbert Rivera

Emerging Technologies are Changing the IT Job Market - 0 views

  •  
    This article is pretty interesting. It is about how emerging technologies are changing the IT job market. With the emergence of technologies such as: the world of SDN, Converged Infrastructure, BYOD, Virtualization, ITaaS, SDS, and PAaaS, and of course, "The Cloud," changing the industry pace, many employers are seeking highly competitive personnel to fill these positions. It also provides information on these new IT technologies and the importance to U.S. vendors and employers on these functions.
  •  
    As a member of the general IT crowd at the moment I know exactly what this article is talking about. Many companies, including my own, are moving toward virtualization and cloud everything. Soon enough, I think just about everything will be "as a service", as it is far more cost effective to operate on the client end, and more cost effective to support on the provider end.
  •  
    I find the BYOD moment interesting; personally I would be weary of people connecting their own devices to my network. I know right now it is about providing life style perks to prospective employees, but at some point a mistake will be made and the internal networks could be compromised.
Amy Harding

Computer Visionary Who Invented the Mouse - NYTimes.com - 2 views

  •  
    Most of us would not consider the mouse emerging technology - but back in 1968 when the mouse was first introduced that technology was bleeding edge!
Amy Harding

Security Requirements for Cryptographic Modules - 4 views

  •  
    This standards publication (FIPS 140-2) is a key standard's document. Skim through it and see if you can find some ideas for emerging threats against the standard(s).
  • ...1 more comment...
  •  
    FIPS 140-3 is on its way and is needed as 140-2 is quite old now. Interestingly however, crypto is one of the slower moving changes in information security. Many of our algorithms have been around for many years; we have moved forward by increasing key size rather than changing the algorithms. AES and 3DES are still FIPS approved, whereas RC4 is not (which is used by many internet giants such as google and facebook).
  •  
    Any time you are allowed to introduce code into a program, you have a chance for error. By allowing cryptographic software and firmware to be updated, I think you will always have the chance for emerging threats to be introduced in the form of malware. Recently, the U.S. has stopped allowing the use of Chinese built hardware for certain DOD/ Federal agencies. if we allow the enemy to build the devices we use to form our security foundations, we have already lost the war.
  •  
    I believe the frequency of review of this policy is untimely to the speed technology advances in. If they could move the review from 5 years to 2 years will suffice. At times, once the policy is published folks are already working on the revision to keep up with technology growth. "Since a standard of this nature must be flexible enough to adapt to advancements and innovations in science and technology, this standard will be reviewed every five years in order to consider new or revised requirements that may be needed to meet technological and economic changes."
Jocelyn Gladston

Evaluating Technology Companies | Lux Research - 1 views

  •  
    Evaluating technologies
Ken Ripley

Popular Science | New Technology, Science News, The Future Now - 0 views

shared by Ken Ripley on 24 Mar 13 - Cached
  •  
    Popular Science has always been a resource I depend upon to see whats on the horizon in the technology field.  
Michael Austin

NFC Phones Raise Opportunities, Privacy And Security Issues - 1 views

  •  
    An article detailing the privacy concerns regarding mass implementation of NFC technology in mobile devices.
  • ...1 more comment...
  •  
    Michael, privacy is just going to become more and more of an issue as time goes on. Good post. Ben
  •  
    Michael & Ben, Did you know that iPhone 5 passed on Near-Field Communication Data Sharing while Samsung, Nokia and HTC didn't ? Article: Android Embraces, iPhone 5 Passes on Near-Field Communication Data Sharing http://www.scientificamerican.com/article.cfm?id=near-field-communication-security-purchase Sam Rios
  •  
    Hi Sam, I had noticed that the iPhone 5 wasn't using NFC. I didn't research it further though, as I honestly don't care for Apple products (way overpriced imho). There are numerous reasons Apple may not want to use NFC, which could be anything from them having a competing technology and not wanting it to prosper to them simply not seeing the value the technology in its current implementation (it is still in its infancy in some respects). I found a site which was able to list numerous reasons NFC is lagging behind: http://news.cnet.com/8301-1035_3-57441842-94/is-nfc-killing-google-wallet/ ~Mike
cpanagopulos

Memory Implants - 7 views

  •  
    Theodore Berger, a biomedical engineer and neuroscientist at the University of Southern California in Los Angeles, envisions a day in the not too distant future when a patient with severe memory loss can get help from an electronic implant. In people whose brains have suffered damage from Alzheimer's, stroke, or injury, disrupted neuronal networks often prevent long-term memories from forming.
  • ...3 more comments...
  •  
    That is awesome!!! Johnny Mnemonic is coming sooner than expected. I watched a grandfather suffer through Alzheimer's. It would be amazing if this could treat such a horrible condition.
  •  
    This is pretty amazing stuff! It would be wonderful if this could actually brought to practical application. We are slowly losing my mother-in-law to dementia or Alzheimer's and it's a terrible process. Losing memories of people is bad enough, but she has lost the ability to perform self-care functions.
  •  
    The fine line between "Crazy" and "Visionary" seems to be demonstrated with this developing technology. Being able to map and store long-term memories in an ailing brain seems remarkable. Achieving this not through drugs or some form of conventional treatment but rather through a silicone chip implanted in the brain is outstanding. I'll be interested in seeing where this development goes.
  •  
    WO!!!! Shut the front door this article is like a science fiction read but the technology if approved for humans can have a dramatic impact on folk who have family members with dementia/Alzheimer as this can possibly make life less stressful for caregivers. It would be nice to see parents and grandparents not have to suffer this dreaded disease if science and technology can provide solution. But I would like to have one myself as I can get all the help I can for TOTAL RECAL!!!
  •  
    Wow, this is crazy. I don't know if I should be terrified or excited. This reminds of the old movie Jonny Mneumonic in the 90s. All these new sciences are great. The only problem that I have is bad people getting a hold of such technologies to exploiting weaker humans. I'm thinking along the line of putting false memories into people's brain and turning them into someone that they are not.
Christopher Salinas

Emerging Tech - Self Healing Chips - 2 views

  •  
    Research from CalTech on self healing chips. They were able to destroy chips with laser and watch as the chip recovered to near it's original state. Could have future implication for indestructible equipment in the field (i.e. DoD).
  • ...3 more comments...
  •  
    This is really interesting technology. If they figure out a way to produce this technology at a reasonable cost, this would be huge for operational security. Like anything else, if this becomes possible to mass produce, the cost will inevitable drop over time, enough for the cost-benefit ratio to make sense to implement in a variety of hardware. Nice find!
  •  
    CalTech's self-healing chips are truly an amazing step into the future. The technology alone is unbelievable. Once this technology is fully tested and developed it could be used in many different ways, such as part of the space station, pace makers, insulin pumps, etc. It is a very exciting discovery.
  •  
    The self-healing integrated chips is an ingenious solution! This amazing invention will definitely be applied to other systems when the research work is successfully completed. The real concern for me is if there is an unknown adverse effect that its implementation may bring about.
  •  
    Funsho, Adverse as in the machines rising up?
  •  
    My sentiments exactly!
Alvin Thomas

Cybersecurity -- Emerging Technologies in Cybersecurity « WHS WHS - 10 views

  •  
    This is a cool and insightful article regarding emerging cyber security technologies. 
  •  
    I think the part about centralizing a "single federal enterprise network" is a great idea. The federal government has started doing this with things such as the FDCC (Federal Desktop Core Configuration), as well as SCAP (Security Content Automation Protocol), but I think there still needs to be much more. Allowing each federal agency to have their own cyber security within the U.S. seems a little crazy. I think setting one agency to protect the national infastructure, ie the borders of the U.S., down to each agencies front door needs to be standard. Agencies like DOD who have their own Cyber operations centers need to be properly trained and educated if they are going to defend infrastructure. Formalized training needs to be done at the federal level as well as the Civilian level. If you are going to be a security practioner, you must have the credentials, and I am not talking just a Sec+. I think it is time we up the standards on who we call a CyberSecurity professional.
  •  
    Interesting article and objective given. Connecting government cyber operations centers, I think that this will be a hugh, and important step toward achieving a higher level of security. Good read!
samuelrios

Court Says C.I.A. Must Yield Some Data on Drones - NYTimes.com - 3 views

  •  
    Article supports drones as being an emerging technology. ASSignment1, Part1 Support
  •  
    Interesting article, It seems to me that this is just another one of those cases about flexing the "muscle" of the Freedom of Information Act. In my opinion it is pretty common knowledge that targeted drone strikes are being used to eliminate enemies; so why is it so important here that the C.I.A. has to acknowledge these attacks? What would that accomplish? The media outlets already report on successful drone strikes and now there are even military medals to recognize drone pilots. http://www.fsunews.com/article/20130318/FSVIEW0303/130317001/New-military-medal-stirs-controversy-?odyssey=mod|newswell|text|frontpage|s
  •  
    I just wonder how long it's going to take before something comes out of these attacks. Using these drones to fly into other countries like Pakistan, and "take out" suspected enemies is pretty borderline in my opinion. If this were to happen in America, we would certainly not stand for it, and would declare war on the country that carried out the action. Pushing the button from California on a drone missle is alot like conducting cyber warfare from one country to another. The damage that can be done is becoming greater and greater every day as technology is starting to tie together national infrastructures. In my opinion, drones are the some of the first of the cyber warfare machines.
samuelrios

Homeland Security Drones Designed to Identify Civilians Carrying Guns - 4 views

  •  
    Recently uncovered government documents reveal that the U.S. Department of Homeland Security's (DHS) unmanned Predator B drone fleet has been custom designed to identify civilians carrying guns and track cell phone signals. "I am very concerned that this technology will be used against law-abiding American firearms owners," said founder and executive vice president of the Second Amendment Foundation, Alan Gottlieb.
  • ...2 more comments...
  •  
    Good read. After reading this and another related article (http://news.cnet.com/8301-13578_3-57572207-38/dhs-built-domestic-surveillance-tech-into-predator-drones/) There's a fine line which must be established before the full use of this technology, however it does raise concerns for the future in terms of privacy. It's primary purpose for homeland security is the survey the borders of the united states. There are certainlly risks involved in its use. Ensuring that this technology is effectively secured from attacks to its onboard weapons and communications systems is equally important to the issues raised in the articles.
  •  
    Good post I've heard chatter about drones being flown over the USA before. I could see the benefits of using drones for recon and counter terrorism, but this opens the door for much larger issues. Where will line be drawn in the sand as far as citizen privacy and avoiding the "big brother" hysteria?
  •  
    The power these drones represent is incredible. I can easily see how the can (and will be) abused. As Jammes pointed out, the Primary purpose of DHS is securing our nations borders, yet I have read of DHS rading peoples homes because of an "improperly" imported car! Not to sound like I am about to put a tinfoil hat on, but I do see the distinct possibility of the banning of firearms in this country as happened in England in 1997. These tools will be in place well before that day.
  •  
    The use of Drones in the field as a tool to fight the fight on the borders is one thing, using them as a tool to fight terrorism is still another, but using them as tool to spy on the people of the United States is another. I think this is one that the United States Supreme Court will be deciding soon.
Michael Austin

Strengths and Weaknesses of Near Field Communication (NFC) Technology - 0 views

  •  
    A paper discussing how NFC technology works, what it's vulnerabilities are, and how to counteract them.
Shondre Fort

Gesture Control Technology - A giant leap in Human Computer Interaction - 0 views

  •  
    Posted by Gesture-recognition technology's role in redefining usability in consumer electronics has been discussed in great detail already. Music players you can mute by snapping your fingers, TVs that switch off when you walk away from them, the new Google glass that reportedly clicks pictures when you wink are all rapidly taking gesture-control technology mainstream.
Funsho Aiyedogbon

Technology takes off in long-term care - 0 views

  •  
    This article by Patricia Sheehan explores the way technology is improving the delivery of health care services to senior citizens.
1 - 20 of 89 Next › Last »
Showing 20 items per page