Archive for November 2017

Man With Machine: Harnessing the Potential of Artificial Intelligence  When we think of artificial intelligence (AI), we think of robots — machines that mimic human behavior or thought. This is partly the influence of comics, novels, movies and other pop culture tidbits, but the boundaries of AI have progressed far beyond this basic personification.  At its most basic level, machine learning, a subset of

Turing Machine paper is published, November 12, 1937–November-12–1937?utm_content=buffer3dc5b&utm_medium=social&  Britain’s Alan Turingpublished a paper entitled “On Computable Numbers with an Application to the Entscheidungs-problem” on November 12, 1937, was later renamed the Turing Machine.

A Formula for Success with GDPR – IBM Analytics – Medium The General Data Protection Regulationcomes into effect on May 25th 2018 and many organizations are already seeking outside help to understand and navigate the complexities. As you consider connecting with an advisor, this brief series of posts lets you know some of the most important questions to ask, how to set priorities. You should consider having a

One Bitcoin Transaction Now Uses As Much Energy As Your House In a Week – Slashdot It look like Bitcoin is not very “clean” technology:  Bitcoin’s incredible price run to break over $7,000 this year has sent its overall electricity consumption soaring, as people worldwide bring more energy-hungry computers online to mine the digital currency.   Bitcoin miners burn through over 24 terawatt-hours of electricity annually. This averages out to a shocking 215

Nanodevice Maps the Angle of Light to Color and Vice Versa – IEEE Spectrum  An international team of researchers has added a small twist to typical light filters. They’ve fabricated a nanoscale device that divides incident light into its different component colors based on the direction the light is coming from. They’ve switched from making filters with equally spaced grooves to an aperiodic architecture wherein the grooves are not equally spaced. The research

How Threat Modeling Helps Discover Security Vulnerabilities Application threat modeling can be used as an approach to secure software development, as it is a nice preventative measure for dealing with security issues, and mitigates the time and effort required to deal with vulnerabilities that may arise later throughout the application’s production life cycle. Unfortunately, it seems security has no place in

Evolution of Mobile Communication from 1(G) to 4G, 5G, 6G, 7G … The cellular wireless Generation (G) generally refers to a change in the nature of the system, speed, technology and frequency. Each generation have some standards, capacities, techniques and new features which differentiate it from the previous one. Now 5G is hot technology at the top of the hype cycle. But that’s not the end

The digital age of data art | TechCrunch Many artists use as material for art the raw data produced by our societies, seeking innovative means of display or transforming it into a work of art. By blurring boundaries between art and information, data artdispels the myth of the romantic artist while offering a fundamental artistic act in a critical commentary of the digital age