Learn from the Past, Excel in the Present and Change the Future – Exploring technology and business innovation and the implications for enterprise software implementation by understanding the rapidly changing software, business and technology landscape through summary, comparison, analysis and practical experience.
Humans recognize most objects in images and videos even when the objects are shown from different viewpoints, vary in sizes and scales or are transformed, converted or rotated.
They also can identify objects that are partially hidden or obstructed from the view based on their experience and brain processing power that is, so far, unmet by computers. Continue reading “Object-recognition Software – Why is the Error Rate that High?” »
Password protection is an ongoing security issue. People may see you typing your password and steal the login information. That passwords get hacked through a smart computer algorithm is getting a bigger problem.
The alternative of using fingerprint and retina scans or facial or voice recognition is much more secure than physical passwords are but also comparable slow, unpleasant and costly.
As presented at the 2013 Workshop on Usable Security at the 17th International Conference on Financial Cryptography and Data Security in Okinawa, Japan, there may be a new solution for these problems.
A study by the School of Information led professor John Chuang explored the possibility to replace password authentication by using brainwave measurements (electroencephalograms (EEGs). Continue reading “Thinking Your Password to Login – Brainwave Readers Will Make It Possible” »
Fingerprints are the impressions that are left by the finger friction ridges of any individual. All fingerprints are unique. They differ from person to person and can be used for identifying different individuals.
So why don’t use these differences to identify users of electronic devices? … we do!
The number of Internet services is continuously increasing. This goes along with the need to create more user accounts, which have to be protected by adequate, ideally unique identifiers (ID) and passwords.
Network devices produce high amount of information, so called ‘Big Data’. Most of this information is used for statistical analysis of user behaviors and for getting insight into web site performances.
Network data is also recognized to be of high value for real-time security and defense strategies to create tactical, self-defending networks. One of today’s hottest topics is the potential for Big Data technologies and techniques to help address information security (InfoSec) problems.
Combining virtual infrastructure that modern companies use, Big Data will improve organizations’ capability to react rapidly to cyber threats and to adjust their infrastructure to immediately improve the cybersecurity and defend attacks. Continue reading “Big Data – A Future Strategy for Tactical Security Networking” »
The openness and interconnectedness of the internet is advantageous but also bears risks for commerce and consumers, private information exchange and sensitive data management. Using the web makes shopping, sharing information and using financial and medical apps extremely fast and suitable but it also opens door for information misuse while transferring data, such as credit card numbers, addresses and shopping preferences.
To reduce the threats of data theft, different encryption technologies have developed that make sure that only authorized persons or organizations are able to decipher sensitive information.
Encryption is defined as the translation of data into a secret code to create and maintain most operative data security. Encryption has it foundation in cryptography, which is the science of codes and ciphers to guard secret information. Continue reading “Encryption Technology – Securing your Information” »
Recent discoveries, that facial recognition applications can easily abused to gain sensitive information about users, induced a new debate about privacy and security regulations for digital identification methods.
In today’s digital age, users continually expose their personal information using cell phones, communicating through social networks, through online shopping and by sending email and other web applications. Each individual leaves behind trails of personal information.
To prevent unauthorized access to such information passwords and PINs are used. Continue reading “Facial Recognition” »
Automated test cases: Bigger companies require it, start-up companies should have it – do you consider it?
As each airline needs to test the functionality of their aircrafts to guarantee complete safety for their passengers, today’s software engineering teams need to test their software to guarantee full functionality and security for their applications. Or do you want that financial apps calculate close-to but not quiet matching data, doctors give wrong recommendations due to an error in a decision-support systems or social app share by default sensitive information to everybody? Continue reading “Automated Test Cases: Would You Board an Aircraft without Back-up Check?” »
Spyware is of increasing overall concern about internet privacy.
Spyware is defined as malicious software (malware) and data collection programs sometimes called “Spybots” or “Tracking Software”, which secretly collect information about the user. Spyware may be designed for advertising – also known as adware – that consistently contains components for tracking and reporting user information. Finally, spyware may be set-up for changing the configuration of a computer.
In general, the gathering of information about a person or organization occurs without their knowledge. Continue reading “Spyware – Who is watching you?” »