Skip to main content

Home/ CSIA 459/ Group items tagged computing

Rss Feed Group items tagged

Lee Seranni

IBM produces first working chips modeled on the human brain - 0 views

  •  
    IBM has been shipping computers for more than 65 years, and it is finally on the verge of creating a true electronic brain. Big Blue is announcing today that it, along with four universities and the Defense Advanced Research Projects Agency (DARPA), have created the basic design of an experimental computer chip that emulates the way the brain processes information. IBM's so-called cognitive computing chips could one day simulate and emulate the brain's ability to sense, perceive, interact and recognize - all tasks that humans can currently do much better than computers can. Read more at http://venturebeat.com/2011/08/17/ibm-cognitive-computing-chips/#ARGgedJd4BxtJ1Vo.99
Amy Harding

Embrace the cloud computing revolution - with caution | Comment is free | guardian.co.uk - 1 views

  •  
    For your cloud computing assignment
  •  
    I liked this article very much and understand his concerns. It is very hard to trust something that you can't examine. How do cloud computing agencies validate their systems, with there be a GOP security report that tells us what agencies are legitimate. I have to read that top 10 cloud reporting article to see exactly how that was determined.
Gilbert Rivera

EBSCOhost: Storing Information in the Cloud - A Research Project - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography In this research document, the authors provide us with a study of data storage in the cloud. It focuses on the management, operation and security of data stored for long periods of time in the cloud. This item is useful for the fact that it can present several demographics to business regarding cloud computing security, data storage functionality and also cites several business surveys that can assist in organizations to make the decision to migrate to cloud computing services and data storage.
Marie Arrington

Cloud Computer Security - 0 views

  •  
    This is great explanation of security threats associated with cloud computing on the 3 available options in cloud computing: Infrastructure, Platform & Application.
James Thomas

Collaboration in Multicloud Computing Environments - 0 views

  •  
    This article describes a new concept in development for cloud computing which involves combining cloud services into a collection of clouds to form what it defines as a multicloud environment called cloud mashups.
Marie Arrington

UW Experimental Computer Engineering Lab - Securing Emerging Technologies - 0 views

  •  
    Unexpected security risks can arise with new, emerging computer technologies. We seek to stay one step ahead of the "bad guys" and identify, measure, and learn from their risks before actual threats manifest. We co-led the first experimental study of the computer security properties of wireless implantable medical devices.
Marie Arrington

Cloud Computing Explained - 0 views

  •  
    This was a simple video that broke down cloud computing to its simplest form. I liked how it explained the billing and information use of the concept.
Amy Harding

Biometrics and Cyber Security - 8 views

  •  
    Review the presentation.
  • ...3 more comments...
  •  
    This article does mention balancing some weaknesses of biometrics. The one weakness that is common right now among these systems is the use of usernames and passwords to form a secondary means of accessing the system once the biometrics no longer work. With the implementation of multi-modal systems, this could be resolved. The article also discusses international based systems, which could be difficult, personal information is a source of contention between many countries. Where is the information stored, and what laws become enforceable depending on the users point of presence?
  •  
    Interesting article thank you for posting it. As Phil and the article mentioned where is this information stored. The security of this information is deeply concenring. Not that I am a conspiracy theorist but I really do not want my biometric information to be stored on some database. I remember when my daughter was young there was a push to have your child's DNA sample taken and stored in case it was ever needed in the event the child was kidnapped or lost. After thinking about it back then I just did not see how the government having her DNA sample was a good thing. Of course if she ever comitted a crime I would like to think that I would want her punished for the crime but being a parent I also know that I would do anything to protect her, so why would I give the government a readily available DNA sample for them to identify her with. In the event a sample was needed because of some terrible event happening to her one could be provided through other methods. Just my thoughts.
  •  
    I just posted up an article on fooling biometric fingerprint scanners, Facial scanners can be fooled with photos http://thehackernews.com/2011/11/android-facial-recognition-based.html The Danger is that while one can get a new password or smart card if the old is compromised, You only have one face, two eyes and 10 fingers to use for ID and can't get new ones when someone figures out how to comprimise them.
  •  
    Thanks for the posting especially since my project deals with Ambient Intelligence wherein biometrics can be an integral part of its implementation. One of the most common and frequent incidents in Service Management is authentication. Whether it is with entering secure facilities or logging into computer systems both in the office and remotely, people tend to forget their credentials. Consequently, this causes a loss in productivity as someone tries to regain their access to systems or for system administrators to provide them with temporary access. Ambient intelligence and biometrics may seem as a viable solution since the physical characteristics is intrinsic in each individual. This presentation presents me with the cybersecurity flaws and weaknesses that should be mitigated.
  •  
    Biometrics is always something I have found to be fascinating. Because like this article stated no one knows who you are on the other end of that computer so being able to authenticate that in some sort of method is a great thing
Lee Seranni

IBM creates liquid-based transistors that can process data like the human brain - 1 views

  •  
    For decades, the transistor has been the building block of electronic devices, from computers to smartphones. It has seen little change, but a team of researchers at IBM has given the transistor a major makeover, and it may enable the company to build computers that function more like the way the human brain works.
glenn_g

Cloud computing in Cyberwarfare - 0 views

  •  
    If you want to know about cloud computing or the Flame virus, you need to read this article
Shondre Fort

Gesture Control Technology - A giant leap in Human Computer Interaction - 0 views

  •  
    Posted by Gesture-recognition technology's role in redefining usability in consumer electronics has been discussed in great detail already. Music players you can mute by snapping your fingers, TVs that switch off when you walk away from them, the new Google glass that reportedly clicks pictures when you wink are all rapidly taking gesture-control technology mainstream.
Gilbert Rivera

Storing Information in the Cloud - A Research Project - 0 views

  •  
    Cloud Data Storage: Annotated Bibliography In this research document, the authors provide us with a study of data storage in the cloud. It focuses on the management, operation and security of data stored for long periods of time in the cloud. This item is useful for the fact that it can present several demographics to business regarding cloud computing security, data storage functionality and also cites several business surveys that can assist in organizations to make the decision to migrate to cloud computing services and data storage.
Amy Harding

Computer Visionary Who Invented the Mouse - NYTimes.com - 2 views

  •  
    Most of us would not consider the mouse emerging technology - but back in 1968 when the mouse was first introduced that technology was bleeding edge!
Amy Harding

Ranking the Top 10 Cloud Startups - CIO.com - 3 views

  •  
    This ranking of cloud start ups could be helpful to you for your research project.
  •  
    Very interesting report. People voted, not technicians, nor security agencies, just people who use the system. It seems a lot like how the personal computer came and the internet was created. Just get it up and running and security will come later. How can that be? A countries banking system just got compromised. No inspection standard to say this cloud solution is safe, just a group of people who say they can access that information when they want and the company saying it is perfectly safe. Little do they know it could also be accessed by others just as quickly - just my opinion, not quite facts yet.
Amy Harding

http://www.safegov.org/media/46155/measuring_what_matters_final.pdf - 3 views

  •  
    Agencies must establish a unique baseline threat assessment and automate monitoring to ensure good cybersecurity, says a SafeGov report released Tuesday.
  •  
    Safegov has an interesting approach to cybersecurity. I feel the framework an effective way to approach security. Ben
  •  
    The legislation proposal aims at achieving cybersecurity due to increased network threats in government and in organizations. Educating the public and the use of cyber security technologies have great impacts on government agencies. Our government department comply with NIST and ISO/IEC, and the two bodies help in enhancing privacy and security in the national and international levels. It is important to identify efficient operational, technical and management security controls in a comprehensive computer security plan. Risk assessment in management control assists in identification of risks and in putting up risk assessment policies. Operational controls have their basis on restrictions to access information resources and in user permissions. Sam
Lee Seranni

Hands On - IEEE Spectrum - 1 views

  •  
    I came across this article when researching for another class. I know at least one person has chosen RFID for their paper and thought this may help. An individual had RFID tags placed in his hands and operates many aspects of his life throught this technology.
1 - 20 of 48 Next › Last »
Showing 20 items per page