A site devoted mostly to everything related to Information Technology under the sun - among other things.

Friday, December 20, 2013

Robotic Police

US company launches robot security guard
 
The night watchman of the future is 5 feet tall, weighs 300 pounds and looks a lot like R2-D2 - without the whimsy. And will work for US$6.25 an hour.
 
A company in California has developed a mobile robot, known as the K5 Autonomous Data Machine, as a safety and security tool for corporations, as well as for schools and neighborhoods.
 
"We founded Knightscope after what happened at Sandy Hook," said William Santana Li, a co-founder of that technology company, now based in Sunnyvale, Calif. "You are never going to have an armed officer in every school." [Unfortunately, or fortunately, as the case may be.]
 
 

Friday, August 23, 2013

Two JavaScript Books

In addition to the now quite famous "JavaScript: The Good Parts" by Douglas Crockford check out the following books that discuss JavaScript from a Functional Programming view point:

  1. "Functional JavaScript" by MichaelFogus.  You will need to understand the Underscore JavaScript Library (http://underscorejs.org/) since the book heavily uses that.
  2. "JavaScript Allongé" by Reginald Braithwaite.

Thursday, August 8, 2013

Smartphones for smart ….


From the BBC

I was going to buy one – it sounds so cool !!! – but I think I have changed my mind.

 

 “Internet of Things” has started giving me the willies!

 ____________________

A luxury toilet controlled by a smartphone app is vulnerable to attack, according to security experts.

 

Retailing for up to $5,686 (£3,821), the Satis toilet includes automatic flushing, bidet spray, music and fragrance release.

 

The toilet, manufactured by Japanese firm Lixil, is controlled via an Android app called My Satis.

 

 

Tuesday, June 18, 2013

Tuesday, June 11, 2013

Unique in the Crowd

In the paper "Unique in the Crowd: The Privacy Bounds of Human Mobility," published in Nature's Scientific Reports last year, Yves-Alexandre de Montjoye, César A. Hidalgo, Michel Verleysen, and Vincent D. Blondel of MIT and the Universite Catholique de Louvain, examined a dataset of 15 months of anonymous cell-phone data from 1.5 million people in Belgium (most likely).

There were no names, addresses, or phone numbers in the data, yet they argue that "if individual's patterns are unique enough, outside information can be used to link the data back to an individual." In fact, just four points of observation -- time of the call and the nearest cell-phone tower -- were enough to identify 95 percent of individuals in the data et. 

That is, if one makes four calls from four different places over the course of a 15-month period, one's pattern of movement could be identified out of a population two and a half times the size of Washington, D.C.

If someone is able to cross-reference that with the Twitter feed, say,  he could be able to build a pretty good picture of  who be that person .

The pattern still worked when the researchers "coarsened" their sample by using less specific time observations and by lumping multiple cell-phone towers into one.

Evidently, the way people move through the world and share and communicate information is quite distinctive.

de Montjoye  has stated that: "We use the analogy of the fingerprint, in the 1930s, Edmond Locard, one of the first forensic science pioneers, showed that each fingerprint is unique, and you need 12 points to identify it. So here what we did is we took a large-scale database of mobility traces and basically computed the number of points so that 95 percent of people would be unique in the dataset."

Since phone companies need to keep this kind of data for billing and customer service purposes, it seems inevitable that it would sooner or later be put to questionable use by the security agencies of various governments.
 
The authors have an op-ed in the Christian Science Monitor arguing that consumers should be granted more control over and more information about how much of their data is being stored and for what purpose. 

Their study "shows that when it comes to rich metadata datasets, there are no clear cut between anonymous and not anonymous data. Achieving anonymity is really hard and might even be algorithmically impossible."

The paper may be found here:

http://www.nature.com/srep/2013/130325/srep01376/pdf/srep01376.pdf

About Me

My photo
I had been a senior software developer working for HP and GM. I am interested in intelligent and scientific computing. I am passionate about computers as enablers for human imagination. The contents of this site are not in any way, shape, or form endorsed, approved, or otherwise authorized by HP, its subsidiaries, or its officers and shareholders.

Blog Archive