Menu

Blog

Page 11667

Feb 19, 2016

Fujitsu develops new deep learning technology to analyze time-series data with high precision

Posted by in categories: business, education, robotics/AI, wearables

Fujitsu Laboratories today announced that it has developed deep learning technology that can analyze time-series data with a high degree of accuracy. Demonstrating promise for Internet-of-Things applications, time-series data can also be subject to severe volatility, making it difficult for people to discern patterns in the data. Deep learning technology, which is attracting attention as a breakthrough in the advance of artificial intelligence, has achieved extremely high recognition accuracy with images and speech, but the types of data to which it can be applied is still limited. In particular, it has been difficult to accurately and automatically classify volatile time-series data–such as that taken from IoT devices–of which people have difficulty discerning patterns.

Now Fujitsu Laboratories has developed an approach to that uses advanced to extract geometric features from time-series data, enabling highly accurate classification of volatile time-series. In benchmark tests held at UC Irvine Machine Learning Repository that classified time-series data captured from gyroscopes in wearable devices, the new technology was found to achieve roughly 85% accuracy, about a 25% improvement over existing technology. This technology will be used in Fujitsu’s Human Centric AI Zinrai artificial intelligence technology. Details of this technology will be presented at the Fujitsu North America Technology Forum (NAFT 2016), which will be held on Tuesday, February 16, in Santa Clara, California.

Background

Continue reading “Fujitsu develops new deep learning technology to analyze time-series data with high precision” »

Feb 18, 2016

Can Wearable Technology Threaten the Cyber Security of Your Business?

Posted by in categories: business, cybercrime/malcode, security, wearables

Better ditch the watch and shirt.

Wearables invite Cyber Security Risks in the office.


Smart wearable technology has a future-is-now feel to it. Unfortunately, it also has a your-data-is-vulnerable feel as well. Here’s how smart wearables are putting your company’s cyber security at risk.

Read more

Feb 18, 2016

Obama wants to spend $19 billion on cyber security

Posted by in categories: business, cybercrime/malcode, employment, health, quantum physics

One thing that will remain with tech for many years is jobs in cyber security — even with the layer of security that Quantum technology brings in the next 10 years; there is always a migration and retirement state that can (depending on the business and systems involved) could go on for years after Quantum platforms and networks are installed.


Then in December, aided and abetted by a Republican-controlled Congress, he eradicated those minor restrictions and replaced mindless austerity with clueless profligacy.

It proposes lifting the limits entirely from 2018. “It adheres to last year’s bipartisan budget agreement, it drives down the deficit, and includes smart savigs on health care, immigration and tax reform”.

Continue reading “Obama wants to spend $19 billion on cyber security” »

Feb 18, 2016

Stretchable nano-devices towards smart contact lenses

Posted by in category: nanotechnology

One of my favorites for 2016 — smart contact lenses.


Researchers at RMIT University and the University of Adelaide have joined forces to create a stretchable nano-scale device to manipulate light.

RMIT University.

Read more

Feb 18, 2016

ISRO is developing a nano satellite to monitor suspended particles in polluted Indian cities

Posted by in categories: particle physics, quantum physics, satellites

Nano Satellite could be interesting and even expanded upon especially as we look to expand the usage of Quantum Technology across various wireless devices in the future as well as microbot technology to enable connectivity to the cloud and other wireless devices.


The nano-satellite, which is among ISRO’s important missions, will monitor air pollutants that pollute cities including Delhi, Lucknow, Amritsar and Allahabad.

The nano-satellite will weigh 15kg and placed 500 km above the earth.

Continue reading “ISRO is developing a nano satellite to monitor suspended particles in polluted Indian cities” »

Feb 18, 2016

New Wireless Neural Implant Transmits Brain Signals to Prosthetic Limbs

Posted by in categories: biotech/medical, computing, cyborgs, neuroscience

A new chip designed for the brain is now wireless. Now that it is no longer connected using wires, will it compromise its accuracy?

The Nanyang Technological University in Singapore has developed a smart chip that can be used for neural implants in order to wirelessly transmit brain signals to the rest of the body with 95% accuracy. These neural implants, and the data that they register, are expected to help curtail symptoms of diseases like Parkinson’s, and they could also help paraplegic patients move their prosthetic limbs.

For operations, external devices can use the the 5mm by 5mm chip to receive and analyze data before sending back important details, instead of sending the entire data stream all at once. This drastically decreases its power consumption, making the tech far more viable.

Read more

Feb 18, 2016

A five-dimensional black hole could break the theory of relativity

Posted by in categories: computing, cosmology, physics

The 5 Dimensional Black Hole could break the theory of relativity: Simulation suggests strange rings with ‘ultragravity’ that defy physics may exist.

Follow us: @MailOnline on Twitter | DailyMail on Facebook.


Researchers from the University of Cambridge and Queen Mary University of London made the discovery after simulating a black hole shaped like a very thin ring using computer models.

Read more

Feb 18, 2016

Cyber Threat Information Sharing Guidelines Released

Posted by in categories: cybercrime/malcode, law

Finally; it’s a start at least.


This week, the Federal government took the first steps toward implementation of the The Cybersecurity Information Sharing Act (CISA), enacted into law last December. CISA aims to encourage sharing of cyber threat indicators and defensive measures among private companies and between the private sector and the Federal government by providing liability protection for sharing such information in accordance with the Act. The DHS Federal Register notice was published this morning here.

As required by the Act, the government has released four pieces of guidance designed to assist companies and Federal agencies with respect to sharing, receiving and handling cyber threat information.

Read more

Feb 18, 2016

Cryptowall has been a cash bonanza for criminals, failure for cops

Posted by in category: cybercrime/malcode

Though dubbed the most successful malware in history Cryptowall can be stopped.

Read more

Feb 18, 2016

A Blueprint to Build Conscious Machines

Posted by in categories: neuroscience, robotics/AI

https://youtube.com/watch?v=KV3hHGUGXIU

A complete cognitive architecture to implement systems that are self-aware and capable of intentional mutations. Now available at mecasapiens.com.

HALIFAX, CANADA, February 16, 2016 (Newswire.com) — Monterège Design Inc. is pleased to announce the publication of a cognitive architecture to implement synthetic consciousness. The systems based on this architecture will be fully autonomous, self-aware and capable of intentional mutations. The architecture, published under the title The Meca Sapiens Blueprint, is complete and ready for design and implementation. It can be purchased on line at mecasapiens.com.

Read more