Showing posts with label computing. Show all posts
Showing posts with label computing. Show all posts

Wednesday, December 18, 2013

NSA Knows Who You Are

5 billion cellphone calling records have been collected by the NSA as part of a location and data tracking system, according to The Washington Post.

Details of the program were among the many documents leaked by former defense contractor Edward Snowden to news organizations earlier this year.

Tuesday, December 17, 2013

Adobe Breach

Last year, 152 million user records, including emails and poorly encrypted passwords, were exposed in a breach of Adobe Systems' computers. It's been called the largest publicly known leak of user information in history.

Protect yourself with safer alternatives, like the Foxit Reader and PrimoPDF creator.

Monday, December 16, 2013

Crooks and Bitcoin

The FBI estimates that 600,000 bitcoins are owned by Ross Ulbricht, the alleged mastermind of online drug marketplace the Silk Road.

The bitcoins are encrypted and cannot be easily accessed. Currently, they are worth around $60 million and represent approximately 5 percent of the entire market.

Sunday, December 15, 2013

Amazon dot Drone

Amazon.com plans to deliver packages to customers using unmanned aerial vehicles.

Amazon's Prime Air Service, powered by drones, will be ready technologically to enter commercial operations as soon as the necessary regulations are in place as delineated for civilian unmanned aircraft by the U.S. Federal Aviation Administration.

Estimated date of actual operation - 2015!

Friday, December 13, 2013

Insecure Apps

Recently Hewlett-Packard conducted a study regarding the security of business apps for the iPhone. HP concluded that many of them give themselves unnecessary permission to access phone features and user data, given the stated purposes of the apps.

HP also found that more than 90% of the business apps had privacy or security flaws and a new report from Trend Micro found that there are now 1 million "malware and high-risk apps" in the wild.

Wednesday, December 4, 2013

Bitcoin Bubble?

How did a currency with scarce global acceptance move from $10 to over $1000 in under a year?’

That answer is quite simple: growing media interest has created a surge in demand. The more the price has moved, the more press coverage it has received and, consequently, the more people have been introduced to – and demanded – the digital currency.

But the system is now straining at the seams. Its computational underpinnings have collectively reached 100 times the performance of the world’s top 500 supercomputers combined: more than 50,000 petaflops. And it is not as secure and anonymous as it seems.

Will Bitcoin’s self-correcting mechanisms, and the enlightened self-interest of its users, be able to address these weaknesses and keep Bitcoin on the rails? Only time will tell.

Friday, November 29, 2013

Thank You, Mr. Bloomberg

Applied Sciences NYC  announced its fourth applied technology graduate campus: the Carnegie Mellon University Integrative Media Program. The CMU campus follows the flagship Cornell Tech campus on Roosevelt Island, the Center for Urban Science and Progress led by NYU in downtown Brooklyn, and Columbia's Institute for Data Science and Engineering.


New York's expansion of its Applied Sciences endeavor should remind observers that innovation is the critical driver of economic growth across all industries.

Sunday, November 3, 2013

HFT and the Next Crash

High Frequency Trading (HFT) is a form of algorithmic trading where firms use high-speed market data and analytics to look for short term supply and demand trading opportunities. HFT firms usually hold their positions for less than a minute while perpetually looking for opportunities to buy and sell.

These transactions happen thousands of times a day, take microseconds, and often net less than a penny in profit per share. Multiply that by immense volume and you're rich, but at what price?

Tuesday, October 29, 2013

Mugshot or Mugging?

Mug shots are merely artifacts of an arrest, not proof of a conviction, and many people whose images are now on display were never found guilty, or the charges against them were dropped.

What if your mugshot appeared online, for your friends, family, and employer to see? A New York Times exposé found that for-profit web sites like Mugshots, BustedMugshots and JustMugshots aren’t the civic-minded sites they appear to be, charging from $30 to $400 for someone to have their mugshot removed from the site.

Friday, October 11, 2013

Gates Profile

I understand that it may interfere with your prejudices, but if you have an open mind, watch the profile below to find that one of the richest men in the world is also one of the most generous.

Wednesday, October 9, 2013

Who Needs Internet?

A survey released recently found that in addition to the 15 percent of adults who don't use the Internet on any device, another nine percent say they only go online at their workplace.

The report by the Pew Research Center found a whopping 92 percent of these "offline adults" with no interest in using the Internet or email in the near future.

Monday, October 7, 2013

Reign of the Robot Donkeys

WildCat is a four-legged robot being developed to run fast on all types of terrain. So far WildCat has run at about 16 mph on flat terrain using bounding and galloping gaits.

On a scarier note, WildCat is being developed with funding from DARPA's M3 program. Yes, those are the people who hope someday to bring you robot soldiers and robot armies.

Saturday, October 5, 2013

Old, But Social

The Pew Research Center's Internet & American Life Project has been studying online adults’ social networking site use since 2005, and has seen substantial growth since then. Today, 72% of online adults use social networking sites. Although younger adults continue to be the most likely social media users, one of the more striking stories about the social networking population has been the growth among older internet users in recent years. Those ages 65 and older have more than tripled their presence on social networking sites in the last four years—from 13% in the spring of 2009 to 43% now.

Friday, October 4, 2013

Fake Reviews...Who Knew?

New York regulators announced agreements with 19 companies accused of posting fraudulent reviews of their services or those of their clients. The companies in question have all pledged to end the practice and will pay a collective fine of $350,000.

Among the companies involved in the case are "reputation-enhancement firms". These businesses post fake reviews on behalf of their clients on such sites as Google, Yelp, and Yahoo. Investigators with the New York attorney general's office found people in Bangladesh, the Philippines, and Eastern Europe willing to create stellar reviews of businesses they had never used, all for just a buck per review.

Monday, September 30, 2013

Most Dangerous Celeb

In an attempt to promote its products, McAfee researched pop culture’s most famous people to reveal the riskiest celebrity athletes, musicians, politicians, comedians, and Hollywood stars on the web.

For example, when you search for pictures of Lily Collins you have about a 14.5% chance of landing on a page that tested positive for spam, adware, spyware, viruses, or other malware.

Sunday, September 29, 2013

Robot Bartenders

Did you know that robots are "socially inadequate"?

A team of scientists has tried to study and improve their skills. If they succeed, perhaps the research could be applied to the majority of humans who also seem to suffer from this apparent inadequacy :)

Monday, September 23, 2013

Just Delete Me

Did you ever feel trapped by a site or social network? You'd like to delete your account and content, but it does not seem possible. It's at least not easy. Many companies use dark pattern techniques to make it difficult to uncover how to delete your account.

JustDelete.me aims to be a directory of urls to enable you to easily delete your account from web services.

Sunday, September 8, 2013

Moore's Law and ECON 101

Moore's Law, named after Intel co-founder Gordon Moore, states that the number of transistors that can be placed on an integrated circuit doubles roughly every two years. For decades, chipmakers have succeeded in shrinking chip geometries, allowing Moore's Law to remain on track.

Intel has already begun discussing commercial 10-nanometer technology, which is expected to ramp up in 2015. But Intel component scientists have also said that it's not clear what technology will be used beyond 7 nanometers.

Even if technical obstacles are overcome, if this is achieved at too great a cost, it may still not make sense to proceed along the traditional silicon-based path. In other words, success will be achieved only when physical and economic dimensions are satisfied.

Thursday, September 5, 2013

Mega-Banks Get Burgled

At least three US banks in recent months have been plundered by fraudulent wire transfers while hackers deployed "low powered" DDoS attacks to mask their theft.

The DDoS attacks were likely used as a distraction for bank personnel to prevent them from immediately identifying a fraudulent transaction, which is necessary to stop the wire transfer.

Wednesday, August 28, 2013

Ewaste: Part Two

As promised, below you find a list of places to dispose of your ewaste without endangering others.

Online sales or recycling outlets
BuyMyTronics / Swappa / Gazelle / YouRenew / NextWorth / FlipSwap / Cash For Smartphones / Amazon / Target / eBay / Craiglist /

Physical sales or recycling outlets
Best Buy / RadioShack / Costco / EcoATM /

National charities
Cell Phones for Soldiers / Hope Phones / Hope Line Phones /