Menu

Blog

Archive for the ‘computing’ category: Page 770

Nov 20, 2014

Bitcoin, Cryptocurrency, and Blockchain Technology — Voting Systems

Posted by in categories: automation, big data, bitcoin, business, complex systems, computing, disruptive technology, economics, encryption, engineering, ethics, geopolitics, government, hacking, hardware, information science, innovation, law, materials, open access, open source, philosophy, policy, polls, privacy, science, security, software, supercomputing, transparency, treaties

Quoted: “Bitcoin technology offers a fundamentally different approach to vote collection with its decentralized and automated secure protocol. It solves the problems of both paper ballot and electronic voting machines, enabling a cost effective, efficient, open system that is easily audited by both individual voters and the entire community. Bitcoin technology can enable a system where every voter can verify that their vote was counted, see votes for different candidates/issues cast in real time, and be sure that there is no fraud or manipulation by election workers.”


Read the article here » http://www.entrepreneur.com/article/239809?hootPostID=ba473f…aacc8412c7

Nov 20, 2014

Has the flawed password system finally had its day?

Posted by in categories: computing, cybercrime/malcode, encryption, privacy

— BBC

woman thinking in from of password graphic

Passwords are a pain. We choose simple words that are easy to remember, but equally easy for hackers to guess.

Yet we still forget them. And they also get stolen with alarming frequency.

Continue reading “Has the flawed password system finally had its day?” »

Nov 19, 2014

BitCoin, Cryptocurrency, and Blockchain Technology — FACTOM

Posted by in categories: automation, big data, biotech/medical, bitcoin, business, complex systems, computing, disruptive technology, economics, education, encryption, engineering, environmental, ethics, finance, futurism, geopolitics, hacking, information science, law, materials, open access, policy, science, security, software, supercomputing, transparency

Quoted: “The Factom team suggested that its proposal could be leveraged to execute some of the crypto 2.0 functionalities that are beginning to take shape on the market today. These include creating trustless audit chains, property title chains, record keeping for sensitive personal, medical and corporate materials, and public accountability mechanisms.

During the AMA, the Factom president was asked how the technology could be leveraged to shape the average person’s daily life.”

Kirby responded:

“Factom creates permanent records that can’t be changed later. In a Factom world, there’s no more robo-signing scandals. In a Factom world, there are no more missing voting records. In a Factom world, you know where every dollar of government money was spent. Basically, the whole world is made up of record keeping and, as a consumer, you’re at the mercy of the fragmented systems that run these records.”

Continue reading “BitCoin, Cryptocurrency, and Blockchain Technology — FACTOM” »

Nov 17, 2014

A New Economic Layer — BitCoin, Cryptorcurrency, and Blockchain Technology

Posted by in categories: big data, bitcoin, business, complex systems, computing, disruptive technology, economics, electronics, encryption, engineering, ethics, finance, futurism, geopolitics, hacking, human trajectories, information science, innovation, internet, law, materials, media & arts, military, open access, open source, policy, privacy, science, scientific freedom, security, software, supercomputing

Preamble: Bitcoin 1.0 is currency — the deployment of cryptocurrencies in applications related to cash such as currency transfer, remittance, and digital payment systems. Bitcoin 2.0 is contracts — the whole slate of economic, market, and financial applications using the blockchain that are more extensive than simple cash transactions like stocks, bonds, futures, loans, mortgages, titles, smart property, and smart contracts

Bitcoin 3.0 is blockchain applications beyond currency, finance, and markets, particularly in the areas of government, health, science, literacy, culture, and art.

Read the article here » http://ieet.org/index.php/IEET/more/swan20141110

Sep 27, 2014

Getting Apple, Microsoft and Fortune-500s to Uninterruptedly Buy From You!

Posted by in categories: business, computing, disruptive technology, economics, education, electronics, engineering, ethics, information science, science, scientific freedom

Getting Apple, Microsoft and Fortune-500s to Uninterruptedly Buy From You!

0    FORESIGHT

Apple, Berkshire Hathaway Corporation, Mitsubishi Motors, Honda, Daimler-Chrysler’s Mercedes-Benz, Toyota, Royal Dutch Shell Oil Company, Google, Xerox, Exxon-Mobil, Boeing, Amazon, Procter & Gamble, NASA and DARPA, Lockheed Martin, RAND Corporation and HUDSON Institute, Northrop Grumman Corporation, GEICO, Microsoft, etc.

FOREWORD:

You are going to need to prepare thyself breathtakingly. You will need a Brioni suit and a silk tie and understand, later on below this material, how to get lucky via Rampant Rocket Science.

Continue reading “Getting Apple, Microsoft and Fortune-500s to Uninterruptedly Buy From You!” »

Sep 26, 2014

Review: When Google Met WikiLeaks (2014) by Julian Assange

Posted by in categories: big data, bitcoin, computing, encryption, ethics, events, futurism, geopolitics, government, hacking, internet, journalism, law, law enforcement, media & arts, military, transhumanism, transparency
Julian Assange’s 2014 book When Google Met WikiLeaks consists of essays authored by Assange and, more significantly, the transcript of a discussion between Assange and Google’s Eric Schmidt and Jared Cohen.

Continue reading “Review: When Google Met WikiLeaks (2014) by Julian Assange” »

Sep 11, 2014

Justice Beyond Privacy

Posted by in categories: computing, disruptive technology, ethics, government, hacking, internet, law, policy, privacy, security

As the old social bonds unravel, philosopher and member of the Lifeboat Foundation’s advisory board Professor Steve Fuller asks: can we balance free expression against security?

justice

Justice has been always about modes of interconnectivity. Retributive justice – ‘eye for an eye’ stuff – recalls an age when kinship was how we related to each other. In the modern era, courtesy of the nation-state, bonds have been forged in terms of common laws, common language, common education, common roads, etc. The internet, understood as a global information and communication infrastructure, is both enhancing and replacing these bonds, resulting in new senses of what counts as ‘mine’, ‘yours’, ‘theirs’ and ‘ours’ – the building blocks of a just society…

Read the full article at IAI.TV

Aug 29, 2014

The Globalized Smartification and Changing for the Better Via Simultaneous: Activated and Deactivated Kaisen!

Posted by in categories: business, complex systems, computing, economics, education, engineering, futurism, physics, science, scientific freedom, security

The Globalized Smartification and Changing for the Better Via Simultaneous: Activated and Deactivated Kaisen!

We Activate Kaisen and We Deactivate Kaisen

Chiefly, this brief post is about the pictorial I composed here.

Pay great attention to this proprietary image. I greatly value Japanese execs and sages but they focus only on throughputting( the Known Inputs Into Desirable Outputs inside their premises, without considering the Non-Existential and Existential Risk of the External Environment (outside their industrial facade) at large as we do in the White Swan’s Tranformative and Integrative Risk Management Services.

Continue reading “The Globalized Smartification and Changing for the Better Via Simultaneous: Activated and Deactivated Kaisen!” »

Jul 19, 2014

Why Apple’s Swift Language Will Instantly Remake Computer Programming

Posted by in category: computing

By — Wired
Apple CEO Tim Cook walks off stage after this year's WWDC presentation.
Chris Lattner spent a year and a half creating a new programming language—a new way of designing, building, and running computer software—and he didn’t mention it to anyone, not even his closest friends and colleagues.

He started in the summer of 2010, working at night and on weekends, and by the end of the following year, he’d mapped out the basics of the new language. That’s when he revealed his secret to the top executives at his company, and they were impressed enough to put a few other seasoned engineers on the project. Then, after another eighteen months, it became a “major focus” for the company, with a huge team of developers working alongside Lattner, and that meant the new language would soon change the world of computing. Lattner, you see, works for Apple.

Read more

Jun 23, 2014

Is the End of Moore’s Law Slowing the World’s Supercomputing Race?

Posted by in categories: computing, supercomputing

— Wired

The world's top supercomputer: the Tihane-2.

Every six months, a team of supercomputing academics compiles a list of the most powerful computers on the planet. It’s called the Top500 list, and it has become a competition of sorts. National labs vie against universities, military facilities, NASA, and even temporary cloud-based supercomputers—all to see who’s building the worlds’ largest number-crunching machines.

This year, the machine on the top of the list is Tihane-2, a Chinese system that can perform 33.86 quadrillion calculations per second. But here’s the thing. Tihane-2 was on top back in November of 2013, and a year ago too. In fact, when you look at the top 10 machines on the June list, there’s only one new entry–an unidentified Cray supercomputer, operated by the U.S. government. It’s ranked tenth.

Read More