Skip to main content

Home/ Groups/ CSIA 459
Joseph Deleon

CERT Information for System Administrators - 0 views

  •  
    This is a great website that stays well informed and is known for excellent training.
Percy Kendrick

What will IT be like in 50 years? - 0 views

  •  
    This video gives an example of technologies of the future and a different way to pose questions for how technology can improve daily life but also where technology can take us.
  • ...1 more comment...
  •  
    I really like the way they talked about complete integration in the video, as that definitely seems to be the direction that everything is going. Forget about dedicated devices, everything from your couch to your car, to your refrigerator will have intense computing power, and will be able to communicate with you and everything else around you to better your life. The only downfall I see of this is it seems like people would forget how to not use technology, and would be completely helpless if it was lost.
  •  
    Complete integration is really important. It is a focus of many technological advancements. This is due to the fact that people want technology that makes life as whole easier not just individual tasks. I am eager to see what technologies the future will actually hold!
  •  
    Interesting assessments by the individuals in that provided video Percy. I personally keyed into the statement that technology will operate in a more conversational (social) manner that's similar to how humans interact. The further technological-based assessments are interesting especially with regard to gene mapping and what diseases somebody may face within their lifetime.
Christopher Salinas

Emerging Tech - Self Healing Chips - 2 views

  •  
    Research from CalTech on self healing chips. They were able to destroy chips with laser and watch as the chip recovered to near it's original state. Could have future implication for indestructible equipment in the field (i.e. DoD).
  • ...3 more comments...
  •  
    This is really interesting technology. If they figure out a way to produce this technology at a reasonable cost, this would be huge for operational security. Like anything else, if this becomes possible to mass produce, the cost will inevitable drop over time, enough for the cost-benefit ratio to make sense to implement in a variety of hardware. Nice find!
  •  
    CalTech's self-healing chips are truly an amazing step into the future. The technology alone is unbelievable. Once this technology is fully tested and developed it could be used in many different ways, such as part of the space station, pace makers, insulin pumps, etc. It is a very exciting discovery.
  •  
    The self-healing integrated chips is an ingenious solution! This amazing invention will definitely be applied to other systems when the research work is successfully completed. The real concern for me is if there is an unknown adverse effect that its implementation may bring about.
  •  
    Funsho, Adverse as in the machines rising up?
  •  
    My sentiments exactly!
Funsho Aiyedogbon

5 Emerging Technologies Every Office Will Have In 2020 - 1 views

  •  
    This article explores five emerging technologies that will be commonly used in business offices in the next seven years.
  • ...1 more comment...
  •  
    Now this is scary and yet so amazing. The fact that they are already predicting that typing a password into a device is something that is going to be in the past, is unreal. A device is going to recognize your face and allow you to have access to it. The scary part is the phone aspect in how the devices will pick up your phone conversation and automatically send a calendar invite to your device. New technologies are definitely amazing but still, there is little to no talk on how they are going to secure the environments that they are creating.
  •  
    Very interesting article. Basically, all human existence will be completely gone by 2020. I can't believe these technologies even exist and are currently in the prototype stage. You never know, this technology can take over sooner that what this article expect. The most interesting technology to me the use of sensors. If things come out to be in full effect, with the use of these sensors can provide very accurate data and help avoid the use of any fraudulent it identity threats. Thanks!
  •  
    I read this article and loved it. After reading it a while back I became very interested in Gesture Control. This is the emerging technology that I chose for this class. I know that this article talks about the use of this technology in the office but we have already seen it in Smartphones (the new Galaxy) who knows where it will pop up next!
Shondre Fort

Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - 0 views

  • Schlenoff and his colleagues used their SCORE approach to evaluate technologies as they progressed under two DARPA programs: ASSIST and TRANSTAC. In ASSIST, DARPA is funding efforts to instrument soldiers with wearable sensors—video cameras, microphones, global positioning devices and more—to continuously record activities while they are on a mission. TRANSTAC is driving the development of two-way speech-translation systems that enable speakers of different languages to communicate with each other in real-world situations, without an interpreter. By providing constructive feedback on system capabilities, the SCORE evaluative framework helps to drive innovation and performance improvements.
  •  
    SCORE (System, Component and Operationally Relevant Evaluations) is a unified set of criteria and software tools for defining a performance evaluation approach for complex intelligent systems. It provides a comprehensive evaluation blueprint that assesses the technical performance of a system and its components through isolating and changing variables as well as capturing end-user utility of the system in realistic use-case environments. The SCORE framework has proven to be widely-applicable in nature and equally relevant to technologies ranging from manufacturing to military systems. It has been applied to the evaluation of technologies in DARPA programs that range from soldier-worn sensor on patrol to speech-to-speech translation systems. It is also currently being applied to the assessing the control of autonomous vehicles on a shop floor.
  •  
    From NIST Tech Beat: June 21, 2011 Most industry executives, military planners, research managers or venture capitalists charged with assessing the potential of an R&D project probably are familiar with the wry twist on Arthur C. Clarke's third law*: "Any sufficiently advanced technology is indistinguishable from a rigged demo."
Gilbert Rivera

Emerging Technologies are Changing the IT Job Market - 0 views

  •  
    This article is pretty interesting. It is about how emerging technologies are changing the IT job market. With the emergence of technologies such as: the world of SDN, Converged Infrastructure, BYOD, Virtualization, ITaaS, SDS, and PAaaS, and of course, "The Cloud," changing the industry pace, many employers are seeking highly competitive personnel to fill these positions. It also provides information on these new IT technologies and the importance to U.S. vendors and employers on these functions.
  •  
    As a member of the general IT crowd at the moment I know exactly what this article is talking about. Many companies, including my own, are moving toward virtualization and cloud everything. Soon enough, I think just about everything will be "as a service", as it is far more cost effective to operate on the client end, and more cost effective to support on the provider end.
  •  
    I find the BYOD moment interesting; personally I would be weary of people connecting their own devices to my network. I know right now it is about providing life style perks to prospective employees, but at some point a mistake will be made and the internal networks could be compromised.
LaToya White

Priorities for Research on Current and Emerging Network Trends - 1 views

  •  
    This study and report was generated by a collaborative group of experts under the European Network and Information Security Agency (ENISA) umbrella. Five areas have been assessed as presenting the biggest need for research within a window of three to five years: cloud computing, real-time detection and diagnosis systems, future wireless networks, sensor networks, and supply chain integrity. This article interested me because as cyber security professionals, it's important to adopt a global mentality when researching technology and security solutions.
  •  
    Good source for all kinds of information. One topic which interested me from this site was privacy in online tracking. I feel this is especially important with social media and societies growing dependence on mobile technologies. Google and Facebook tap into many sources to include your location, cookies, likes, etc...They amount of information they mine is scary sometimes.
Michael Madrzykowski

2013 Emerging Cyber Threats Report - 2 views

  •  
    Georgia Tech's security summit report
  • ...1 more comment...
  •  
    Nice find and I'm glad you posted this. On the topic of mobile malware, the report states that more smartphones were purchased in 2012 than PC's, and the Internet was accessed more on smartphones than any other device. The article mentions this, and I agree that the mobile malware threat will increase as the android and iOS ecosystems stretch wider and wider. It was also interesting to read about cloud storage, and how authorization will be one of it's major vulnerabilities as it becomes more widely used for business.
  •  
    Great article. Thing like this are very interesting to me. The section on Cloud Computing was by far my favorite. This type of technology is emerging and at the same time it has turned into a challenge for attackers to try to break. Security is going to be very vital for this service to work and more likely will be the subject of any topic related to cloud technology. Cloud service providers need to make a stronger statement and provide some type of assurance to the customer. Thanks!
  •  
    I had actually read this article before, but it was good to read it again. While they are many elements that are concerning I find the "filter bubbles" troubling. A user has the right to know that their search results have been filtered. You think you're conducting an open search, only to read this and find out your results may be limited.
Lee Bry

RSA 2013: Is Cryptography Still Necessary? - 0 views

  •  
    An interesting article that is relevant to this weeks (week2) discussion questions regarding cryptology. Needed or not needed?
Cheryl Hoffman

Search Engine Optimization (SEO) Poisoning - 1 views

  •  
    SEO Poisoning manipulates search engine results to make sites that are malicious in nature place higher in the results list. According to the article in 2011 40% of all cyberattacks resulted from SEO poisoning.
  •  
    I know that when I'm doing a Google or Bing search, I am looking for a specific item or topic and sometimes don't even think about reviewing the link that I'm clicking on. The high amount of malware that is in search engines is scary. The pointers that were in the article were very true and very easy for the every day user to do when they are doing a search. And anyone that does not have an anti-virus or anti-malware on their system is just asking for their system to be attacked.
  •  
    I use AVG security on my laptop and it uses an add-on called link scanner. When I search, the results are rated as safe or not, with a check mark or an "X" accordingly. So you immediately know which sites to avoid. It's worth trying since this could essentially save you the time and headache of undoing malware or spyware you might contract otherwise. It's a nice "peace of mind" tool.
sarahterry

Emerging Technologies such asBig Data and Cloud Bring New Opportunities for Innovations... - 1 views

  •  
    Very interesting how these companies are merging their companies together to build a better solution. I found the Cray company (last blurb) interesting in that their storage solution for Linux x86.
Lisa Ruggiero

Emerging Tech - 2 views

  •  
    This link is has a variety of different stories written about up and coming technology like using viruses to power an electric generator. When I saw it I was thinking what application could this possibly have to technology? Apparently one day viruses will power small devices like your phone. This one is pretty far out and I found the article very interesting. I didn't find anything specific about the writer so I don't know his background other than he is a freelance writer.
  •  
    This is indeed very interesting. It is good to know that someone out there is developing a virus that will benefit mankind. This technology is supposed to be able to replace conventional batteries; it will enable people to charge their smart phones anywhere, even when walking.
cpanagopulos

A Brief Look at the Fitbit Flex Personal Tracker - 1 views

  •  
    Here's a cool new wearable tech gadget called the FitBit Flex. Designed for personal fitness tracking. It's a wristband that's tracks your steps and monitors sleep. You can sync your daily stats with an Android or iOS app. There are a lot of rumors about Apple's development of an iWatch, so more wrist gadgets could be released soon.
  •  
    My wife loves her fitbit zip. This type of tracking technology is very cool, but can leave some consumers wondering what else is being tracked, recorded and uploaded when synching it with its application.
  •  
    Fitbit Flex Personal Tracker is interesting, but needs to be easier to put on and change the sensor. I also would like to have a battery that lasted longer than five to six days. It would be nice to know how the other trackers' batteries held up. I did like the silent alarm feature.
Jennifer Otto

Emerging Technology in Evaluation of Nanomedicine - Molecular Pharmaceutics (ACS Public... - 0 views

  •  
    Article on emerging technology
Bob Lloyd

Centralized Management | Sourcefire - 0 views

  •  
    Testing.....
  • ...1 more comment...
  •  
    I see Bob's post
  •  
    Bob, still not sure what was up (prob my issue), I can def. see/comment on it now. The sourcefire technologies you posted stuck out to me mainly in one way...they boast that they are a little bit more secure, which is always good, but at under half the price (of the industry average for IDS). They have many good ideas and tools in place to try and get to the top it seems!
  •  
    I used this product in 2010. Very cool and as I recall rather expensive.
Allen Hotte

When Everybody Starts Wearing Smartglasses, Google Won't Be the Only Player - 0 views

  •  
    Sales of the devices will depend on development of compelling apps Google Glass is just the beginning. The search giant's smartglasses are in the headlines, but numerous other players are also looking to cash in on what's expected to be a boom in eyewear that puts virtual and augmented reality face-front.
greg mack

Emerging Tech - 0 views

  •  
    The most important technology news, developments and trends with insightful analysis and commentary. Coverage includes hardware, software, networking, wireless computing, personal technology, security and cutting-edge technology from the business world to the consumer world.
Jessica Riedel

How to run your own NSA spy program - 2 views

  •  
    With everything going on in the news about this I found this to be a humorous approach to the whole thing. This article basically describes the NSA program on a fundamental level and how an everyday Joe (if they had enough data storage that is) could create their own spy program using these tactics.
  •  
    A spy kit to go. Virtually everything you need to set up shop to gather information and spy on something ( corporate or private). All the hacking tools are nearly " off the shelf" and are most likely used for spying. Great post and article.
  •  
    This article gave me a headache thinking about all the data collection. I am not surprised by this at all Google and Facebook are the biggest privacy violators out there. At what point do people drop off the grid to hide from this potential? The reality is that most people have no idea that this potential is out there except for the ones that want to exploit it.
Lee Bry

Enterprise Network Guide - 1 views

  •  
    White paper describing impacts and benefits to new technologies and the requirments and pressures for organizations to implement them (Cyber nightmare?)
  • ...1 more comment...
  •  
    Interesting read. I came across BYOD on other school projects. I think the idea is insane. I could not believe how many organizations were encouraging the bring your own device concept to cut costs. The healthcare industry was one of the biggest advocates from the research I came across.
  •  
    Hmmm I agree with you both, this seems like a horrible idea. I cannot imagine the amount of people who do not properly update, patch and run security scans on their personal devices, I for one would not want to be connected to that in anyway, especially on a business function. I also have to think heavily about the government and contractors dealing with highly sensitive material and I cannot see these trends happening with them. Not just BYOD but also getting rid of the wired LAN's. Good/interesting post.
  •  
    Testing
alan savage

How to Stop Saying Um, Uh, and Other Filler Words - 1 views

  •  
    After listening to one of my posts to voicethread, that I thought was pretty solid, I did what my old English teacher did and counted the "um"'s one my fingers. It was bad. I didn't even know I was doing it. But I was doing 2 'um's about every sentence...it's so distracting from your point. I will work on this.
  •  
    Its funny you posted this. My fiance was listening to me comment and he pointed out that almost everyone says um uh and other filler words i thought he was wrong but then i started to notice i was saying it alot and couldnt help but try and stop.
« First ‹ Previous 141 - 160 of 336 Next › Last »
Showing 20 items per page