Your car will eventually live-stream video of your driving to the cloud

Credit to Author: Lucas Mearian| Date: Fri, 28 Apr 2017 10:40:00 -0700

As self-driving cars become more advanced with a greater number of onboard computers, sensors, cameras and WiFi, the amount of data is expected to balloon, providing automakers, insurers and others with rich information to harvest.

A single autonomous car could generate as much as 100GB of data every second, said Barclays analyst Brian Johnson, in a note published Wednesday.

autonomous cars big data Barclays

If extrapolated out to the entire U.S. fleet of vehicles — 260 million in number — autonomous cars and trucks could potentially produce about 5,800 exabytes, Johnson stated.

To read this article in full or to leave a comment, please click here

Read more

Quantum computing advances toward the enterprise

Credit to Author: Sharon Gaudin| Date: Fri, 14 Apr 2017 12:19:00 -0700

 

Quantum computing may still sound like the stuff of science fiction, but within the next 10 years, it could be a reality

“Systems are still pretty rudimentary,” said Charles King, an analyst with Pund-IT.  “Though they perform some specific kinds of calculations faster than traditional computers, they are defined by their limitations. When true, fully operable quantum systems come online, they will force the IT industry, public and private sector organizations and individuals to fundamentally rethink certain kinds of problems and all but abandon some conventional solutions.”

To read this article in full or to leave a comment, please click here

Read more

New ransomware demanded high score on anime-style shooter game not bitcoins

Credit to Author: Darlene Storm| Date: Mon, 10 Apr 2017 09:23:00 -0700

Never underestimate what a person can come up with when he or she is bored as was recently highlighted by the accidental release of a ransomware that required victims to reach an astronomically high score on an anime-style shooter game instead of paying an outrageous ransom in bitcoins.

The Malware Hunter Team was surprised to discover Rensenware; they said the ransomware did not ask “for any money, but to play a game until you reach a score – and it’s not a joke.”

Victims who wanted their files decrypted were required to score over 200 million points in the “lunatic” level of the game TH12 ~ Undefined Fantastic Object.

To read this article in full or to leave a comment, please click here

Read more

Six in 10 people believe their lives will improve with autonomous vehicles

Credit to Author: Lucas Mearian| Date: Thu, 06 Apr 2017 03:00:00 -0700

Six in 10 people believe connected and autonomous vehicles (CAVs) will improve their quality of life, according to a new study by Strategy Consulting and PricewaterhouseCoopers (PwC).

The study, commissioned by the U.K.-based trade association Society of Motor Manufacturers and Traders, also found half of drivers age 17 to 24 would use a connected, autonomous vehicle (CAV) today.

Among all those surveyed, the biggest benefit from CAVs would be stress-free driving, with cars that brake and park themselves as top attributes.

To read this article in full or to leave a comment, please click here

Read more

IBM Watson: Regular A.I. by day, cybercrime fighter by night

Credit to Author: Rebecca Linke| Date: Tue, 14 Feb 2017 04:11:00 -0800

IBM Watson is an artificial intelligence of many talents. 

It can win Jeopardy!, help find treatment for cancer patients — and now it can find cyberthreats. That’s right, Watson is becoming a cybersecurity expert. So how has IBM helped Watson change hats?

In IT Blogwatch, this reminds us of something.

So what is going on? Alison DeNisco has some background:

IBM Watson has a new job: Cybersecurity specialist. At the RSA Conference…IBM announced the availability of Watson for Cyber Security, with the aim of assisting cybersecurity professionals with threat assessment and mitigation…The company said it is the industry’s first augmented intelligence technology with the ability to power cognitive security operations centers (SOCs).

But what need does Watson fill here? Ian Barker has those details:

To read this article in full or to leave a comment, please click here

Read more

Researchers’ quantum hacking machine may help protect against quantum computing hacks

There seems to be no form of computing which is safe from hacking, but some, such as the Chinese, have pinned their hopes on quantum computing having uncrackable communications. Yet University of Ottawa researchers have managed to build “the first high-dimensional quantum cloning machine capable of performing quantum hacking to intercept a secure quantum message.”

Last year, China launched the world’s first known quantum communications satellite; the Chinese believed its Quantum Experiments at Space Scale (QUESS) satellite was a step toward “creating an unhackable communications system.” While it may seem like the Canadian researchers have poked holes in the dream of secure quantum communications, the opposite may actually be true.

To read this article in full or to leave a comment, please click here

Read more

Researchers propose a way to use your heartbeat as a password

Researchers at Binghamton State University in New York think your heart could be the key to your personal data. By measuring the electrical activity of the heart, researchers say they can encrypt patients’ health records.  

The fundamental idea is this: In the future, all patients will be outfitted with a wearable device, which will continuously collect physiological data and transmit it to the patients’ doctors. Because electrocardiogram (ECG) signals are already collected for clinical diagnosis, the system would simply reuse the data during transmission, thus reducing the cost and computational power needed to create an encryption key from scratch.

To read this article in full or to leave a comment, please click here

Read more