Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Elon Musk Opens Gym For AI Programmers 

May 10, 2016 by  
Filed under Computing

Comments Off on Elon Musk Opens Gym For AI Programmers 

Techie entrepreneur Elon Musk has rolled out an open-source training “gym” for artificial-intelligence programmers.

It’s an interesting move for a man who in 2014 said artificial intelligence, or A.I., will pose a threat to the human race.

“I think we should be very careful about artificial intelligence,” Musk said about a year and a half ago during an MIT symposium. “If I were to guess at what our biggest existential threat is, it’s probably that… with artificial intelligence, we are summoning the demon. In all those stories with the guy with the pentagram and the holy water, and he’s sure he can control the demon. It doesn’t work out.”

Today, Musk is moving to help programmers use A.I. and machine learning to build smart robots and smart devices.

“We’re releasing the public beta of OpenAI Gym, a toolkit for developing and comparing reinforcement learning (RL) algorithms,” wrote Greg Brockman, OpenAI’s CTO, and John Schulman, a scientist working with OpenAI, in a blog post . “We originally built OpenAI Gym as a tool to accelerate our own RL research. We hope it will be just as useful for the broader community.”

The OpenAI Gym is meant as a tool for programmers to use to teach their intelligent systems better ways to learn and develop more complex reasoning. In short, it’s meant to make smart systems smarter.

Musk is a co-chair of OpenAI, a $1 billion organization that was unveiled last December as an effort focused on advancing artificial intelligence that will benefit humanity.

While Musk has warned of what he sees as the perils of A.I., it’s also a technology that he needs for his businesses.

The OpenAI Gym is made up of a suite of environments, including simulated robots and Atari games, as well as a site for comparing and reproducing results.

It’s focused on reinforcement learning, a field of machine learning that involves decision-making and motor control.

According to OpenAI, reinforcement learning is an important aspect of building intelligent systems because it encompasses any problem that involves making a sequence of decisions. For instance, it could focus on controlling a robot’s motors so it’s able to run and jump, or enabling a system to make business decisions regarding pricing and inventory management.

Two major challenges for developers working with reinforcement learning are the lack of standard environments and the need for better benchmarks.

Musk’s group is hoping that the OpenAI Gym addresses both of those issues.

Source- http://www.thegurureview.net/aroundnet-category/elon-musk-opens-training-gym-for-ai-programmers.html

Symantec Has Some Flaws With SEP

April 1, 2016 by  
Filed under Computing

Comments Off on Symantec Has Some Flaws With SEP

Symantec has warned of three serious vulnerabilities in its Endpoint Protection (SEP) software, and is advising users to update their systems.

The bugs affect all builds of the 12.1 version of the SEP software, with the first two flaws allowing authorised but low privilege users of the software to gain elevated and administrative access to the management console, which can be accessed either locally or through a web-based portal.

The third bug is in the sysplant driver and enables users to bypass the SEP’s security controls and run malware and other malicious code on a targeted client machines.

“Exploitation attempts of this type generally use known methods of trust exploitation requiring enticing a currently authenticated user to access a malicious link or open a malicious document in a context such as a website or in an email,” said the security firm.

There have been no recorded exploits of the flaws, so it would appear that Symantec has squashed the bugs before they became a real-world problem for its customers.

The first two bugs were discovered by security researcher Anatoly Katyushin from rival firm Kaspersky Labs, which is a little embarrassing. Discovery of the third bug was credited to the enSilo Research Team.

Symantec advises SEP users to update their software to the 12.1 RU6 MP4 version. It also recommends that users should take precautions and restrict remote access to the management console in order to prevent hackers from attacking client systems through the web portal.

While hackers can direct sophisticated malware at even the most robustly secured systems, exploiting flaws in software offers an easier route into machines and networks, providing hackers get in before the bugs are discovered and patched.

Recent examples can be seen with the discovery of iOS malware which threatens iPhones through an Apple DRM flaw, and an error on Code.org’s website which saw the emails of its volunteers exposed.

Courtesy-TheInq

IBM Goes After Groupon

March 14, 2016 by  
Filed under Around The Net

Comments Off on IBM Goes After Groupon

IBM has filed suit against online deals marketplace Groupon for infringing four of its patents, including two that emerged from Prodigy, the online service launched by IBM and partners ahead of the World Wide Web.

Groupon has built its business model on the use of IBM’s patents, according to the complaint filed Wednesday in the federal court for the District of Delaware. “Despite IBM’s repeated attempts to negotiate, Groupon refuses to take a license, but continues to use IBM’s property,” according to the computing giant, which is asking the court to order Groupon to halt further infringement and pay damages.

IBM alleges that websites under Groupon’s control and its mobile applications use the technology claimed by the patents-in-suit for online local commerce marketplaces to connect merchants to consumers by offering goods and services at a discount.

About a year ago, IBM filed a similar lawsuit around the same patents against online travel company Priceline and three subsidiaries.

To develop the Prodigy online service that IBM launched with partners in the 1980s, the inventors of U.S. patents 5,796,967 and 7,072,849 developed new methods for presenting applications and advertisements in an interactive service that would take advantage of the computing power of each user’s PC and reduce demand on host servers, such as those used by Prodigy, IBM said in its complaint against Groupon.

“The inventors recognized that if applications were structured to be comprised of ‘objects’ of data and program code capable of being processed by a user’s PC, the Prodigy system would be more efficient than conventional systems,” it added.

Groupon is also accused of infringing U.S. Patent No.5,961,601, which was developed to find a better way of preserving state information in Internet communications, such as between an online merchant and a customer, according to IBM. Online merchants can use the state information to keep track of a client’s product and service selections while the client is shopping and then use that information when the client decides to make a purchase, something that stateless Internet communications protocols like HTTP cannot offer, it added.

Source- http://www.thegurureview.net/aroundnet-category/ibm-files-patent-infringement-lawsuit-against-groupon.html 

Apple TV Service Delayed Again

August 26, 2015 by  
Filed under Consumer Electronics

Comments Off on Apple TV Service Delayed Again

Apple Inc will push back rolling out its live TV service to at least next year, Bloomberg reported, citing people familiar with the iPhone maker’s plans.

The company had planned to introduce the service, which is delivered over the Internet, this year.

Discussions with broadcasters such as CBS Corp and Twenty-First Century Fox Inc to license programming are progressing slowly, and lack of content has led Apple to scrap plans to announce the service at a Sept. 9 event, Bloomberg said.

Apple also lacked the computer network capacity to ensure a good viewing experience, Bloomberg said.

The company still plans to introduce a more powerful version of its Apple TV set-top box at the event, which will be held in San Francisco.

Apple was aiming to price the new service at about $30 to $40 a month, media reports have said.

Source

Verizon Fixes Serious Securty Flaw In FiOS

January 29, 2015 by  
Filed under Security

Comments Off on Verizon Fixes Serious Securty Flaw In FiOS

Verizon corrected a serious vulnerability in its My FiOS mobile application that granted unfettered access to email accounts, according to a developer who found the problem.

Randy Westergren, a senior software developer with XDA Developers, looked at the Android version of My FiOS, which is used for account management, email and scheduling video recordings.

“Since Verizon has a good amount of my information, I thought it would be a good candidate for research,” Westergren wrote on his personal blog. “I was right, and the results were astonishing.”

The flaw, contained in the application’s API, could have allowed an attacker to read individual messages from a person’s Verizon inbox and even send emails from an account, he wrote.

Westergren looked at the traffic sent back and forth between My FiOS and Verizon’s servers. He found My FiOS would return the content of someone else’s email inbox by simply substituting a different user ID in a request.

He contacted Verizony, which later acknowledged the problem. Verizon issued a fix last Friday, Westergren wrote.

“Verizon’s security group seemed to immediately realize the impact of this vulnerability and took it very seriously,” Westergren wrote. “They were very responsive during this process and even arranged for a free year of FiOS Internet service as a token of their gratitude.”

Source

Google Moves To Drop CAPTCHA

December 16, 2014 by  
Filed under Around The Net

Comments Off on Google Moves To Drop CAPTCHA

Google announced that it is trying to get rid of those annoying CAPTCHAs required by websites, which is short for Completely Automated Public Turing test to tell Computers and Humans Apart.

Instead of requiring that users fill in the letters and numbers shown in a distorted image, sites that use Google’s reCAPTCHA service will be able to use just one click, answering a simple question: Are you a robot?

“reCAPTCHA protects the websites you love from spam and abuse,” wrote Vinay Shet, product manager for Google’s reCAPTCHA service, in a blog post. “For years, we’ve prompted users to confirm they aren’t robots by asking them to read distorted text and type it into a box… But, we figured it would be easier to just directly ask our users whether or not they are robots. So, we did! ”

Google on Wednesday began rolling out a new API that rethinks the reCAPTCHA experience.

CAPTCHA “can be hard to read and frustrating for people, particularly on mobile devices,” said Zeus Kerravala, an analyst with ZK Research. “People often have to put in the text several times. On the surface, this seems a good way to improve the user experience. It still requires human intervention, just something simpler.”

CAPTCHAs were created to foil computer programs that hackers or spammers use to troll for access to websites or to collect email addresses.

Google said CAPTCHAs are less useful than they have been, although they are still frustrating to everyday users.

“CAPTCHAs have long relied on the inability of robots to solve distorted text,’ wrote Shet. “However, our research recently showed that today’s artificial intelligence technology can solve even the most difficult variant of distorted text at 99.8% accuracy. Thus distorted text, on its own, is no longer a dependable test.”

The new API, along with Google’s ability to analyze a user’s actions — before, during, and after clicking on the reCAPTCHA box — let’s the new technology figure out if the user is human or not.

“The new API is the next step in this steady evolution,” Shet stated. “Now humans can just check the box and in most cases, they’re through the challenge.”

Source

Symantec Uncovers Advanced Spying Malware

December 5, 2014 by  
Filed under Computing

Comments Off on Symantec Uncovers Advanced Spying Malware

An advanced malicious software application has been discovered that since 2008 was used to spy on private companies, governments, research institutes and individuals in 10 countries, anti virus software maker Symantec Corp said in a report on Sunday.

The Mountain View, California-based maker of Norton anti virus products said its research showed that a “nation state” was likely the developer of the malware called Regin, or Backdoor. Regin, but Symantec did not identify any countries or victims.

Symantec said Regin’s design “makes it highly suited for persistent, long-term surveillance operations against targets,” and was withdrawn in 2011 but resurfaced from 2013 onward.

The malware uses several “stealth” features “and even when its presence is detected, it is very difficult to ascertain what it is doing,” according to Symantec. It said “many components of Regin remain undiscovered and additional functionality and versions may exist.”

Almost half of all infections occurred at addresses of Internet service providers, the report said. It said the targets were customers of the companies rather than the companies themselves. About 28 percent of targets were in telecoms while other victims were in the energy, airline, hospitality and research sectors, Symantec said.

Symantec described the malware as having five stages, each “hidden and encrypted, with the exception of the first stage.” It said “each individual stage provides little information on the complete package. Only by acquiring all five stages is it possible to analyze and understand the threat.”

Regin also uses what is called a modular approach that allows it to load custom features tailored to targets, the same method applied in other malware, such as Flamer and Weevil (The Mask), the anti virus company said. Some of its features were also similar to Duqu malware, uncovered in September 2011 and related to a computer worm called Stuxnet, discovered the previous year.

Symantec said Russia and Saudi Arabia accounted for about half of the confirmed infections of the Regin malware and the other countries were Mexico, Ireland, India, Iran,Afghanistan, Belgium, Austria and Pakistan.

Source

Lavaboom Offers To Encrypt

May 1, 2014 by  
Filed under Computing

Comments Off on Lavaboom Offers To Encrypt

A new webmail service named Lavaboom promises to provide easy-to-use email encryption without ever learning its users’ private encryption keys or message contents.

Lavaboom, based in Germany and founded by Felix MA1/4ller-Irion, is named after Lavabit, the now defunct encrypted email provider believed to have been used by former NSA contractor Edward Snowden. Lavabit decided to shut down its operations in August in response to a U.S. government request for its SSL private key that would have allowed the government to decrypt all user emails.

Lavaboom designed its system for end-to-end encryption, meaning that only users will be in possession of the secret keys needed to decrypt the messages they receive from others. The service will only act as a carrier for already encrypted emails.

Lavaboom calls this feature “zero-knowledge privacy” and implemented it in a way that allows emails to be encrypted and decrypted locally using JavaScript code inside users’ browsers instead of its own servers.

The goal of this implementation is to protect against upstream interception of email traffic as it travels over the Internet and to prevent Lavaboom to produce plain text emails or encryption keys if the government requests them. While this would protect against some passive data collection efforts by intelligence agencies like the NSA, it probably won’t protect against other attack techniques and exploits that such agencies have at their disposal to obtain data from computers and browsers after it was decrypted.

Security researchers have yet to weigh in on the strength of Lavaboom’s implementation. The service said on its website that it considers making parts of the code open source and that it has a small budget for security audits if any researchers are interested.

Those interested in trying out the service can request to be included in its beta testing period, scheduled to start in about two weeks.

Free Lavaboom accounts will come with 250MB of storage space and will use two-way authentication based on the public-private keypair and a password. A premium subscription will cost a!8 (around US$11) per month and will provide users with 1GB of storage space and a three-factor authentication option.

Source

Scientist Develop Anti-Faking PC

April 3, 2014 by  
Filed under Computing

Comments Off on Scientist Develop Anti-Faking PC

Scientists have developed a computer system with sophisticated pattern recognition abilities that performed more impressively than humans in differentiating between people experiencing genuine pain and people who were just pretending.

In a study published in the journal Current Biology, human subjects did no better than chance – about 50 percent – in correctly judging if a person was feigning pain after seeing videos in which some people were and some were not.

The computer was right 85 percent of the time. Why? The researchers say its pattern-recognition abilities successfully spotted distinctive aspects of facial expressions, particularly involving mouth movements, that people generally missed.

“We all know that computers are good at logic processes and they’ve long out-performed humans on things like playing chess,” said Marian Bartlett of the Institute for Neural Computation at the University of California-San Diego, one of the researchers.

“But in perceptual processes, computers lag far behind humans and have a lot of trouble with perceptual processes that humans tend to find easy, including speech recognition and visual recognition. Here’s an example of a perceptual process that the computer is able to do better than human observers,” Bartlett said in a telephone interview.

For the experiment, 25 volunteers each recorded two videos.

In the first, each of the volunteers immersed an arm in lukewarm water for a minute and were told to try to fool an expert into thinking they were in pain. In the second, the volunteers immersed an arm in a bucket of frigid ice water for a minute, a genuinely painful experience, and were given no instructions on what to do with their facial expressions.

The researchers asked 170 other volunteers to assess which people were in real discomfort and which were faking it.

After they registered a 50 percent accuracy rate, which is no better than a coin flip, the researchers gave the volunteers training in recognizing when someone was faking pain. Even after this, the volunteers managed an accuracy rate of only 55 percent.

The computer’s vision system included a video camera that took images of a person’s facial expressions and decoded them. The computer had been programmed to recognize that one kind of facial movement combinations suggested true pain and another kind suggested faked pain.

Source

IBM Breaks Big Data Record

February 28, 2014 by  
Filed under Computing

Comments Off on IBM Breaks Big Data Record

IBM Labs claims to have broken a speed record for Big Data, which the company says could help boost internet speeds to 200 to 400Gbps using “extremely low power”.

The scientists achieved the speed record using a prototype device presented at the International Solid-State Circuits Conference (ISSCC) this week in San Francisco.

Apparently the device, which employs analogue-to-digital conversion (ADC) technology, could be used to improve the transfer speed of Big Data between clouds and data centres to four times faster than existing technology.

IBM said its device is fast enough that 160GB – the equivalent of a two-hour 4K ultra-high definition (UHD) movie or 40,000 music tracks – could be downloaded in a few seconds.

The IBM researchers have been developing the technology in collaboration with Swiss research institution Ecole Polytechnique Fédérale de Lausanne (EPFL) to tackle the growing demands of global data traffic.

“As Big Data and internet traffic continues to grow exponentially, future networking standards have to support higher data rates,” the IBM researchers explained, comparing data transfer per day in 1992 of 100GB to today’s two Exabytes per day, a 20 million-fold increase.

“To support the increase in traffic, ultra-fast and energy efficient analogue-to-digital converter (ADC) technology [will] enable complex digital equalisation across long-distance fibre channels.”

An ADC device converts analogue signals to digital, estimating the right combination of zeros and ones to digitally represent the data so it can be stored on computers and analysed for patterns and predictive outcomes.

“For example, scientists will use hundreds of thousands of ADCs to convert the analogue radio signals that originate from the Big Bang 13 billion years ago to digital,” IBM said.

The ADC technology has been developed as part of an international project called Dome, a collaboration between the Netherlands Institute for Radio Astronomy (ASTRON), DOME-South Africa and IBM to build the Square Kilometer Array (SKA), which will be the world’s largest and most sensitive radio telescope when it’s completed.

“The radio data that the SKA collects from deep space is expected to produce 10 times the global internet traffic and the prototype ADC would be an ideal candidate to transport the signals fast and at very low power – a critical requirement considering the thousands of antennas which will be spread over 1,900 miles,” IBM expalined.

IBM Research Systems department manager Dr Martin Schmatz said, “Our ADC supports Institute of Electrical and Electronics Engineers (IEEE) standards for data communication and brings together speed and energy efficiency at 32 nanometers, enabling us to start tackling the largest Big Data applications.”

He said that IBM is developing the technology for its own family of products, ranging from optical and wireline communications to advanced radar systems.

“We are bringing our previous generation of the ADC to market less than 12 months since it was first developed and tested,” Schmatz added, noting that the firm will develop the technology in communications systems such as 400Gbps opticals and advanced radars.

Source

Next Page »