Will Computer Obtain Common Sense?
Even though it may appear PCs are getting dumbed down as we see constant images of cats playing the piano or dogs playing in the snow, one computer is doing the same and getting smarter and smarter.
A computer cluster running the so-called the Never Ending Image Learner at Carnegie Mellon University runs 24 hours a day, 7 days a week searching the Internet for images, studying them on its own and building a visual database. The process, scientists say, is giving the computer an increasing amount of common sense.
“Images are the best way to learn visual properties,” said Abhinav Gupta, assistant research professor in Carnegie Mellon’s Robotics Institute. “Images also include a lot of common sense information about the world. People learn this by themselves and, with [this program], we hope that computers will do so as well.”
The computers have been running the program since late July, analyzing some three million images. The system has identified 1,500 types of objects in half a million images and 1,200 types of scenes in hundreds of thousands of images, according to the university.
The program has connected the dots to learn 2,500 associations from thousands of instances.
Thanks to advances in computer vision that enable software to identify and label objects found in images and recognize colors, materials and positioning, the Carnegie Mellon cluster is better understanding the visual world with each image it analyzes.
The program also is set up to enable a computer to make common sense associations, like buildings are vertical instead of lying on their sides, people eat food, and cars are found on roads. All the things that people take for granted, the computers now are learning without being told.
“People don’t always know how or what to teach computers,” said Abhinav Shrivastava, a robotics Ph.D. student at CMU and a lead researcher on the program. “But humans are good at telling computers when they are wrong.”
He noted, for instance, that a human might need to tell the computer that pink isn’t just the name of a singer but also is the name of a color.
While previous computer scientists have tried to “teach” computers about different real-world associations, compiling structured data for them, the job has always been far too vast to tackle successfully. CMU noted that Facebook alone has more than 200 billion images.
The only way for computers to scan enough images to understand the visual world is to let them do it on their own.
“What we have learned in the last five to 10 years of computer vision research is that the more data you have, the better computer vision becomes,” Gupta said.
CMU’s computer learning program is supported by Google and the Office of Naval Research.
Did Stuxnet Infect A Russian Nuclear Plant?
Comments Off on Did Stuxnet Infect A Russian Nuclear Plant?
Kaspersky has claimed that the infamous Stuxnet computer worm “badly infected” the internal network of an unnamed Russian nuclear plant after it caused chaos in Iran’s nuclear facilities.
Speaking at a keynote presentation given at the Canberra Press Club 2013, Kaspersky CEO Eugene Kaspersky said a staffer at the unnamed nuclear plant informed him of the infection.
“[The staffer said] their nuclear plant network which was disconnected from the internet was badly infected by Stuxnet,” Kaspersky said.
“So unfortunately these people who were responsible for offensive technologies, they recognise cyber weapons as an opportunity.”
Stuxnet was discovered to have spread throughout industrial software and equipment in 2010 and is believed to have been created by the United States and Israel to attack Iran’s nuclear facilities. According to Kaspersky’s source, the malware was carried into the Russian nuclear plant and installed on a physically separated “air-gapped” network.
Kaspersky also made a rather outlandish joke during his speech, saying that all data is subject to theft. “All the data is stolen,” Kaspersky said. “At least twice.”
“If the claim of the Russian nuclear plant infection is true, then it’s easy to imagine how this “collateral damage” could have turned into a very serious incident indeed, with obvious diplomatic repercussions,” said security expert Graham Cluley.
“There is no way to independently verify the claim, of course. But it is a fact that Stuxnet managed to infect many computer systems outside of its intended target in Iran,” Cluley added. “Indeed, the very fact that it spread out of control, was what lead to its discovery by security firms.”
Earlier this year, Symantec claimed that the Stuxnet computer worm could date back further than 2010 and was more widespread than originally believed.
Symantec’s report called “The Missing Link” found a build of the Stuxnet attack tool, dubbed Stuxnet 0.5, which it said dated back to 2005 and used different techniques to sabotage industrial facilities.
Adobe Data Found Online
November 18, 2013 by admin
Filed under Around The Net
Comments Off on Adobe Data Found Online
A computer security firm has discovered data it says belongs to some 152 million Adobe Systems Inc user accounts, suggesting that a breach reported a month ago is much larger than Adobe has so far disclosed and is one of the largest on record.
LastPass, a password security firm, said that it has found email addresses, encrypted passwords and password hints stored in clear text from Adobe user accounts on an underground website frequented by cyber criminals.
Adobe said last week that attackers had stolen data on more than 38 million customer accounts, on top of the theft of information on nearly 3 million accounts that it disclosed nearly a month earlier.
The maker of Photoshop and Acrobat software confirmed that LastPass had found records stolen from its data center, but downplayed the significance of the security firm’s findings.
While the new findings from LastPass indicate that the Adobe breach is far bigger than previously known, company spokeswoman Heather Edell said it was not accurate to say 152 million customer accounts had been compromised because the database attacked was a backup system about to be decommissioned.
She said the records include some 25 million records containing invalid email addresses, 18 million with invalid passwords. She added that “a large percentage” of the accounts were fictitious, having been set up for one-time use so that their creators could get free software or other perks.
She also said that the company is continuing to work with law enforcement and outside investigators to determine the cost and scope of the breach, which resulted in the theft of customer data as well as source code to several software titles.
The company has notified some 38 million active Adobe ID users and is now contacting holders of inactive accounts, she said.
Paul Stephens, director of policy and advocacy for the non-profit Privacy Rights Clearinghouse, said information in an inactive database is often useful to criminals.
He said they might use it to engage in “phishing” scams or attempt to figure out passwords using the hints provided for some of the accounts in the database. In some cases, people whose data was exposed might not be aware of it because they have not accessed the out-of-date accounts, he said.
“Potentially it’s the website you’ve forgotten about that poses the greater risk,” he said. “What if somebody set up an account with Adobe ten years ago and forgot about it and they use the same password there that they use on other sites?”
Chip Makers Going After Cars
October 14, 2013 by admin
Filed under Around The Net
Comments Off on Chip Makers Going After Cars
Chip makers including Broadcom and Renesas Electronics are putting more focus on in-car entertainment with faster processors and networks for wireless HD movies and navigation, aiming to keep drivers informed and passengers entertained.
With PC sales slipping and the mobile device market proving highly competitive, chip makers are looking for greener pastures in other sectors like in-car entertainment and information.
From Renesas comes the R-Car M2 automotive SoC (System-on-a-Chip), which has enough power to handle simultaneous high-definition navigation, video and voice-controlled browsing.
The SoC is meant for use in mid-range systems. It features two ARM Cortex A-15 cores running at up to 1.5GHz and Renesas’ own SH-4A processor plus the PowerVR SGX544MP2 from Imagination Technologies for 3D graphics. This combination helps the M2 exceed the previous R-Car H1 with more than three times the CPU capacity and approximately six times better graphics performance.
Car makers that want to put a more advanced entertainment system in their upcoming models should go for the eight core R-Car H2 SoC, which was announced earlier this year. It is based on ARM’s big.LITTLE architecture, and uses four Cortex-A15 cores and another four Cortex-A7 cores.
The H2 will be able to handle four streams of 1080p video, including Blu-Ray at 60 frames per second, according to Renesas. Mass production is scheduled for the middle of next year, while the M2 won’t arrive in larger volumes until June 2015.
Broadcom on the other hand is seeking to drive better networking on the road. The company’s latest line of wireless chipsets for in-car connectivity uses the fast 802.11ac Wi-Fi wireless standard, which offers enough bandwidth for multiple displays and screen resolution of up to 1080p. Use of the 5GHz band for video allows it to coexist with Bluetooth hands-free calls on 2.4GHz, according Broadcom.
Broadcom has also implemented Wi-Fi Direct and Miracast. Wi-Fi Direct lets products such as smartphones, cameras and in this case in-car computers connect to one another without joining a traditional hotspot network, while Miracast lets users stream videos and share photos between smartphones, tablets and displays.
The BCM89335 Wi-Fi and Bluetooth Smart Ready combo chip and the BCM89071 Bluetooth and Bluetooth Smart Ready chip are now shipping in small volumes.
King.com Has IPO In The Works
October 8, 2013 by admin
Filed under Around The Net
Comments Off on King.com Has IPO In The Works
King.com Ltd, the British mobile gaming firm best known for its popular puzzle game ‘Candy Crush Saga’, has filed confidentially for an initial public offering (IPO) in the United States, a person familiar with the matter said on Sunday.
Online technology companies are rushing to the stock market on the backs of Twitter Inc’s announcement earlier this month that it plans to go public in the most eagerly anticipated IPO since last year’s flotation ofFacebook Inc.
Emerging growth companies such as King can use a secretive IPO registration process in the U.S. thanks to the Jumpstart Our BusinessStartups (JOBS) Act, which loosened a number of federal securities regulations in hopes of boosting capital raising and thereby increasing job growth.
King has hired Bank of America Merrill Lynch Corp, Credit Suisse Group AG and JPMorgan Chase & Co to lead the offering, said the person, confirming an earlier report by the Daily Telegraph and asking not to be identified because the information is confidential.
Representatives for King and the banks either declined to comment or did not respond to requests for comment.
King offers 150 games in 14 languages through mobile phones, Facebook and its website. It boasts more than 1 billion gameplays per day from its users.
The company’s games appeal to a growing trend for players to play puzzles with their friends in short bursts, especially as games are increasingly played on the move on phones or tablets to kill spare minutes.
Rival Zynga Inc went public two years ago in a high-profile IPO that raised $1 billion. Since then, Zynga has suffered from sagging morale during several quarters of worsening performance and repeated waves of layoffs.
Founded in 2003, King has been profitable since 2005 and has not had a funding round since September of that year, when it raised 34 million euros ($46.04 million) from investment firms Apax Partners and Index Ventures.
Apple Hacked
October 2, 2013 by admin
Filed under Smartphones
Comments Off on Apple Hacked
A group of German hackers claimed to have successfully breached the iPhone fingerprint scanner on Sunday, just two days after Apple Inc debuted the technology that it promises will better protect devices from criminals and snoopers seeking access.
If the claim is verified, it will be embarrassing for Apple which is betting on the scanner to set its smartphone apart from new models of Samsung Electronics Co Ltd and others running the Android operating system of Google Inc.
Two prominent iPhone security experts told Reuters that they believed the German group, known as the Chaos Computing Club, or CCC, had succeeded in defeating Apple’s Touch ID, though they had not personally replicated the work.
One of them, Charlie Miller, co-author of the iOS Hacker’s Handbook, described the work as “a complete break” of Touch ID security. “It certainly opens up a new possibility for attackers.”
Apple representatives did not respond to requests for comment.
CCC, one the world’s largest and most respected hacking groups, posted a video on its website that appeared to show somebody accessing an iPhone 5S with a fabricated print. The site described how members of its biometrics team had cracked the new fingerprint reader, one of the few major high-tech features added to the latest version of the iPhone.
The group said they targeted Touch ID to knock down reports about its “marvels,” which suggested it would be difficult to crack.
“Fingerprints should not be used to secure anything. You leave them everywhere, and it is far too easy to make fake fingers out of lifted prints,” a hacker named Starbug was quoted as saying on the CCC’s site.
The group said it defeated Touch ID by photographing the fingerprint of an iPhone’s user, then printing it on to a transparent sheet, which it used to create a mold for a “fake finger.”
CCC said similar processes have been used to crack “the vast majority” of fingerprint sensors on the market.
“I think it’s legit,” said Dino Dai Zovi,” another co-author of the iOS Hacker’s Handbook. “The CCC doesn’t fool around or over-hype, especially when they are trying to make a political point.”
Touch ID, which was only introduced on the top-of-the-line iPhone 5S, lets users unlock their devices or make purchases on iTunes by simply pressing their finger on the home button. It uses a sapphire crystal sensor embedded in the button.
Data used for verification is encrypted and stored in a secure enclave of the phone’s A7 processor chip.
Two security experts who sponsored an impromptu competition offering cash and other prizes to the first hackers who cracked the iPhone said they had reviewed the information posted on the CCC website, but wanted more documentation.
“We are simply awaiting a full video documentation and walk through of the process that they have claimed,” said mobile security researcher Nick DePetrillo, who started the contest with another security expert, Robert Graham. “When they deliver that video we will review it.”
The two of them each put up $100 toward a prize for the contest winner, then set up a website inviting others to contribute. While the booty now includes more than $13,000 in cash, it was not clear that the CCC would receive the full payout, even if DePetrillo and Graham declared them winners.
IBM Still Talking Up SyNAPSE
IBM has unveiled the latest stage in its plans to generate a computer system that copies the human brain, calculating tasks that are relatively easy for humans but difficult for computers.
As part of the firm’s Systems of Neuromorphic Adaptive Plastic Scalable Electronics (SyNAPSE) project, IBM researchers have been working with Cornell University and Inilabs to create the programming language with $53m in funding from the Defense Advanced Research Projects Agency (DARPA).
First unveiled two years ago this month, the technology – which mimics both the size and power of humanity’s most complex organ – looks to solve the problems created by traditional computing models when handling vast amounts of high speed data.
IBM explained the new programming language, perhaps not in layman’s terms, by saying it “breaks the mould of sequential operation underlying today’s von Neumann architectures and computers” and instead “is tailored for a new class of distributed, highly interconnected, asynchronous, parallel, large-scale cognitive computing architectures”.
That, in English, basically means that it could be used to create next generation intelligent sensor networks that are capable of perception, action and cognition, the sorts of mental processes that humans take for granted and perform with ease.
Dr Dharmendra Modha, who heads the programme at IBM Research, expanded on what this might mean for the future, sayng that the time has come to move forward into the next stage of information technology.
“Today, we’re at another turning point in the history of information technology. The era that Backus and his contemporaries helped create, the programmable computing era, is being superseded by the era of cognitive computing.
“Increasingly, computers will gather huge quantities of data, reason over the data, and learn from their interactions with information and people. These new capabilities will help us penetrate complexity and make better decisions about everything from how to manage cities to how to solve confounding business problems.”
The hardware for IBM’s cognitive computers mimic the brain, as they are built around small “neurosynaptic cores”. The cores are modeled on the brain, and feature 256 “neurons” (processors), 256 “axons” (memory) and 64,000 “synapses” (communications between neurons and axons).
IBM suggested that potential uses for this technology could include a pair of glasses which assist the visually impaired when navigating through potentially hazardous environments. Taking in vast amounts of visual and sound data, the augmented reality glasses would highlight obstacles such as kerbs and cars, and steer the user clear of danger.
Other uses could include intelligent microphones that keep track of who is speaking to create an accurate transcript of any conversation.
In the long term, IBM hopes to build a cognitive computer scaled to 100 trillion synapses. This would fit inside a space with a volume of no more than two litres while consuming less than one kilowatt of power.
PayPal Extend Bug Bounty
PayPal is expanding its bug bounty program to individuals aged 14 and older, a move intended to reward younger researchers who are technically ineligible to hold full-fledged PayPal accounts.
PayPal’s program, which is a year old this month, only applied to those 18 years and older. Under the old rule, participants in the program were required to hold valid accounts, which excluded minors, said Gus Anagnos, PayPal’s director of information security.
In May, 17-year-old Robert Kugler, a student in Germany, said he’d been denied a reward for finding a vulnerability. PayPal said the bug had already been found by two other researchers, which would have made Kugler ineligible for bounty.
In an apparent miscommunication, Kugler said he was initially told he was too young rather than the bug had already been discovered. Nonetheless, PayPal said it would look to bring younger people into its program, which pays upwards of $10,000 for remote code execution bugs on its websites.
Those who are under 18 years old can receive a bug bounty payment through a PayPal student account, an arrangement where a minor can receive payments via their parent’s account, Anagnos said.
Anagnos said other terms and conditions have been modified to make its program more transparent, such as clarifying which PayPal subsidiaries and partner sites qualify for the program.
PayPal pays much less for vulnerabilities on partner websites, which have a URL form of “www.paypal-__.com.” A remote execution bug found on that kind of site garners only $1,500 rather than up to $10,000 on the company’s main sites.
Like other bug bounty programs run by companies such as Microsoft and Google, PayPal will publicly recognize researchers on its website with a “Wall of Fame” for the top 10 researchers in a quarter. Another “honorable mention” page lists anyone who submitted a valid bug for the quarter.
Eusebiu Blindu, a testing consultant from Romania, was one of the researchers listed on the Wall of Fame for the first quarter of this year.
“I think Paypal is the best bug bounty program, and I am glad I participated in it from the first days of its launching,” he wrote on his blog.
The DoD May Share Airwaves
August 6, 2013 by admin
Filed under Around The Net
Comments Off on The DoD May Share Airwaves
The U.S. Defense Department is proposing to share some of its radio airwaves with private industry, a nod to growing pressure from the wireless industry and the Obama administration that federal agencies ease their control of valuable spectrum.
In a letter released by the Federal Communications Commission on Tuesday, the Department of Defense offers to share the airwaves it now dominates in the slice of frequencies from 1755 megahertz (MHz) to 1780 MHz with spectrum-hungry wireless and Internet companies.
The military would rearrange its systems within that slice of spectrum as well as the 2025-2110 MHz band and compress programs into the 1780-1850 MHz band that it would retain.
The Defense Department uses the airwaves for programs such as pilot training and drone systems and has faced criticism from some in the industry and in Congress for resisting efforts to open those airwaves for commercial use to satisfy growing demands posed by data-hungry gadgets and services.
The Pentagon had pointed to its own need for airwaves as its use of drones and other reliance on wireless technology grows. It also had estimated the process of moving its programs to new frequencies would cost more than $12 billion.
Under the new plan, the Defense Department drops the cost estimate to $3.5 billion by compromising on sharing slices of airwaves without completely clearing any of the spectrum bands.
In the letter, originally sent on July 17 to the National Telecommunications and Information Administration, which oversees federal airwaves, DOD Chief Information Officer Teresa Takai called the proposal “a workable balance to provide access to the 1755-1780 MHz band most desired by the commercial wireless industry while ensuring no loss of critical DoD capabilities.”
The NTIA, in its own letter to the FCC, said it had not had enough time to review the proposal and could not yet endorse it.
The FCC, with NTIA’s help, is preparing for several auctions of airwaves to take place in coming years, including one that would sell off chunks of federally controlled spectrum. They will be the first reshuffling of airwave ownership since 2008.
Congress has required the FCC to auction off the 2155-2180 MHz band by February 2015 and the industry has sought to pair up that slice of spectrum with the valuable 1755-1780 MHz band, arguing it would collect more money. Lawmakers in the House of Representatives have introduced a bill to ensure such pairing.
The FCC has been drafting a notice of proposed rulemaking that would seek public comments on how the FCC should auction those federally owned or already cleared airwaves to the wireless companies and an FCC official said the agency’s notice will address the Pentagon’s new proposal.
President Barack Obama last month directed federal agencies to look for ways eventually to give up or share more of their airwaves with the private sector. This followed his June 2010 call to open up 500 MHz of federal spectrum for commercial use.
Will 3D Printing Take Off?
August 2, 2013 by admin
Filed under Around The Net
Comments Off on Will 3D Printing Take Off?
The use of cheaper 3D printing is set to take off when a batch of patents expires in 2014.
Duann Scott, design evangelist at 3D printing company Shapeways said that in February 2014, key patents that currently prevent competition in the market for the most advanced and functional 3D printers will expire. The important patent is one which covers “laser sintering” which is the lowest-cost 3D printing technology. Because of its high resolution in all three dimensions, laser sintering can produce goods that can be sold as finished products.
At the moment it is only possible to buy expensive 3D laser sintering printers, which can cost tens of thousands of dollars each. But once the key patents on 3D printing via laser sintering expire, we could see huge drop in the price of these devices, says Scott.
Key patents expired on a more primitive form of 3D printing, known as fused deposition modelling resulted in an explosion of open-source FDM printers that eventually led to iconic home and hobbyist 3D printer manufacturer Makerbot. When the patents on FDM expired the cost of such printers fell as little as $300. Scott thinks that the same thing will happen with laser deposition 3D printers.