Posts

Showing posts from November, 2018

EFF: Stupid Patent of the Month: A Patent on Using Mathematical Proofs

Stupid Patent of the Month: A Patent on Using Mathematical Proofs In some fields, software bugs are more than the proverbial pain in the neck. When software has to ensure that an airplane lands safely, or that a pacemaker keeps operating, there’s no room for error. The idea that mathematical proofs could be used to prove that software is error-free has been around since the 1970s , and is known as “formal verification.” But like a lot of technologies that some visionaries saw coming, it took time to develop. In recent years, computing power has become cheap enough for formal verification to become practical for more software applications . Unfortunately, last month, the field had a monkey wrench thrown into it, in the form of U.S. Patent No. 10,109,010 , which the patent office awarded to a U.K.-based company called Aesthetic Integration Ltd. Claim 1 of the patent describes creating mathematical “axioms”—formal mathematical statements—that describe a computerized trading forum.

EFF: Stupid Patent of the Month: A Patent on Using Mathematical Proofs

Stupid Patent of the Month: A Patent on Using Mathematical Proofs In some fields, software bugs are more than the proverbial pain in the neck. When software has to ensure that an airplane lands safely, or that a pacemaker keeps operating, there’s no room for error. The idea that mathematical proofs could be used to prove that software is error-free has been around since the 1970s , and is known as “formal verification.” But like a lot of technologies that some visionaries saw coming, it took time to develop. In recent years, computing power has become cheap enough for formal verification to become practical for more software applications . Unfortunately, last month, the field had a monkey wrench thrown into it, in the form of U.S. Patent No. 10,109,010 , which the patent office awarded to a U.K.-based company called Aesthetic Integration Ltd. Claim 1 of the patent describes creating mathematical “axioms”—formal mathematical statements—that describe a computerized trading forum.

EFF: Yes, the EU’s New #CopyrightDirective is All About Filters

Yes, the EU’s New #CopyrightDirective is All About Filters When the EU started planning its new Copyright Directive (the “Copyright in the Digital Single Market Directive”), a group of powerful entertainment industry lobbyists pushed a terrible idea: a mandate that all online platforms would have to create crowdsourced databases of “copyrighted materials” and then block users from posting anything that matched the contents of those databases. At the time, we, along with academics and technologists explained why this would undermine the Internet, even as it would prove unworkable. The filters would be incredibly expensive to create, would erroneously block whole libraries’ worth of legitimate materials, allow libraries’ more worth of infringing materials to slip through, and would not be capable of sorting out “fair dealing” uses of copyrighted works from infringing ones. The Commission nonetheless included it in their original draft. Two years later, after the European Parliamen

EFF: Yes, the EU's New #CopyrightDirective is All About Filters

Yes, the EU's New #CopyrightDirective is All About Filters When the EU started planning its new Copyright Directive (the "Copyright in the Digital Single Market Directive"), a group of powerful entertainment industry lobbyists pushed a terrible idea: a mandate that all online platforms would have to create crowdsourced databases of "copyrighted materials" and then block users from posting anything that matched the contents of those databases. At the time, we, along with academics and technologists explained why this would undermine the Internet, even as it would prove unworkable. The filters would be incredibly expensive to create, would erroneously block whole libraries' worth of legitimate materials, allow libraries' more worth of infringing materials to slip through, and would not be capable of sorting out "fair dealing" uses of copyrighted works from infringing ones. The Commission nonetheless included it in their original draft. Two

Data analytics and supply chain management

Image
Data trends, statistics and quantifiable indicators had been a part of supply chain management for long. But all is changing now in a very rapid form. The type of real time analysis, which is available, out of large gathered unstructured data is making the difference.  The big data analysis can uncover hidden patterns, unknown correlations, market trends, customer preferences and other useful information that can help organizations make more informed business decisions at all levels. Data analysis options are readily available and can be used in areas of inventory management, transportation, logistics and forecasting. In warehouses, digital cameras are used to monitor stock levels. This is taken further for forecasting. The same data from camera can be used through machine learning algorithms to be fed in an intelligent stock management system to predict ordering levels. In other words, the whole setup of warehouses and distribution centers can run on its own with very little human

Data analytics and supply chain management

Data trends, statistics and quantifiable indicators had been a part of supply chain management for long. But all is changing now in a very rapid form. The type of real time analysis, which is available, out of large gathered unstructured data is making the difference.  The big data analysis can uncover hidden patterns, unknown correlations, market trends, customer preferences and other useful information that can help organizations make more informed business decisions at all levels. Data analysis options are readily available and can be used in areas of inventory management, transportation, logistics and forecasting. In warehouses, digital cameras are used to monitor stock levels. This is taken further for forecasting. The same data from camera can be used through machine learning algorithms to be fed in an intelligent stock management system to predict ordering levels. In other words, the whole setup of warehouses and distribution centers can run on its own with very little human

Engineering and operational software is driving digital transformation of worker roles

Image
For many years, engineering and operation disciplines within industrial settings were totally detached. In very simple terms the process of designing, building and operating a plant involved a series of handovers from engineers to engineers. You would design the processes, hand over to an engineering company who would design and build the plant, and the control vendor who would design and program the control system and in the end hand everything over physically to the end user to operate the plant. Under such a fractured model, accessing and maintaining the latest documentation for optimizing operational efficiency and profitability of the plant was always and continues to be a major issue if not driven by the owner and operator. With process design software today, there is no longer the need to handover to someone who’s building the plant. All this is done via software that professionally interfaces with the design software that allows people to build the plant and automatically pro

Scrutinizing your cybersecurity strategy through a digital risk lens

Image
The Symantec 2018 Internet Security Threat Report [i] mentions a 600% increase in overall IoT attacks in 2017. It’s clear: cyber threats and incidents are a major operational risk every enterprise faces along their digital transformation journey. That’s why we believe that implementing a cybersecurity strategy that is viewed through the lens of digital risk is imperative. McKinsey estimates there are 120 million new malware variants developing every year [ii] , showing how cyber attacks become more and more relentless…We must heighten end-to-end digital risk measures and operate with a cyber-resilient mindset at every step. For companies embarking on digital transformation, risk today goes well beyond a sole connected object, or database. It now spans the full extended digital enterprise , including supply chain and partners. Managing digital risk therefore must be framed by a business-driven strategy, as “Organizations can no longer evade the truth that digital has become the need

sadasd

sadksadkaskdasdaskdksa ksadmkl sa dkls klsadk lmsa l The post sadasd appeared first on Schneider Electric Blog . Visit Toronto Wiring from Schneider Electric Blog Visit Toronto Wiring

EFF: California Is Still Trying to Gag IMDb. We’re Telling A New Court: Don’t Let It.

California Is Still Trying to Gag IMDb. We’re Telling A New Court: Don’t Let It. California is still trying to gag websites from sharing true, publicly available, newsworthy information about actors. While this effort is aimed at the admirable goal of fighting age discrimination in Hollywood, the law unconstitutionally punishes publishers of truthful, newsworthy information and denies the public important information it needs to fully understand the very problem the state is trying to address. So we have once again filed a friend of the court brief opposing that effort. The case, IMDB v. Becerra , challenges the constitutionality of California Civil Code section 1798.83.5 , which requires “commercial online entertainment employment services providers” to remove an actor’s date of birth or other age information from their websites upon request. The purported purpose of the law is to prevent age discrimination by the entertainment industry. The law covers any “provider” that “owns,

EFF: California Is Still Trying to Gag IMDb. We're Telling A New Court: Don't Let It.

California Is Still Trying to Gag IMDb. We're Telling A New Court: Don't Let It. California is still trying to gag websites from sharing true, publicly available, newsworthy information about actors. While this effort is aimed at the admirable goal of fighting age discrimination in Hollywood, the law unconstitutionally punishes publishers of truthful, newsworthy information and denies the public important information it needs to fully understand the very problem the state is trying to address. So we have once again filed a friend of the court brief opposing that effort. The case, IMDB v. Becerra , challenges the constitutionality of California Civil Code section 1798.83.5 , which requires “commercial online entertainment employment services providers” to remove an actor’s date of birth or other age information from their websites upon request. The purported purpose of the law is to prevent age discrimination by the entertainment industry. The law covers any “provider” th

EFF: EFF Asks Court to Unseal Secret Docket in Case Involving Wiretap of Encrypted Facebook Messenger Calls

EFF Asks Court to Unseal Secret Docket in Case Involving Wiretap of Encrypted Facebook Messenger Calls EFF joined an effort to unseal court records today in a groundbreaking case where the government reportedly tried to force Facebook to compromise the encryption in Facebook Messenger voice calls. Earlier this year, Reuters reported that the government sought the company’s assistance in carrying out a wiretap and intercepting Messenger calls in connection with the investigation of suspected MS-13 gang activity. Although later reports indicated that the court ruled Facebook did not have to comply, the entire proceeding took place under seal, so we could only speculate about the legal arguments made by both sides and the case’s implications for user security. According to press reports, the U.S. Department of Justice tried to get Facebook to turn over customer data and unencrypted Messenger voice calls using a wiretap order. To our knowledge, this hasn’t been done before, and it

EFF: EFF Asks Court to Unseal Secret Docket in Case Involving Wiretap of Encrypted Facebook Messenger Calls

EFF Asks Court to Unseal Secret Docket in Case Involving Wiretap of Encrypted Facebook Messenger Calls EFF joined an effort to unseal court records today in a groundbreaking case where the government reportedly tried to force Facebook to compromise the encryption in Facebook Messenger voice calls. Earlier this year, Reuters reported that the government sought the company’s assistance in carrying out a wiretap and intercepting Messenger calls in connection with the investigation of suspected MS-13 gang activity. Although later reports indicated that the court ruled Facebook did not have to comply, the entire proceeding took place under seal, so we could only speculate about the legal arguments made by both sides and the case’s implications for user security. According to press reports, the U.S. Department of Justice tried to get Facebook to turn over customer data and unencrypted Messenger voice calls using a wiretap order. To our knowledge, this hasn’t been done before, and it

EFF: Questions We Should Be Asking About Facebook’s Smear Campaign Against Its Critics

Questions We Should Be Asking About Facebook’s Smear Campaign Against Its Critics The New York Times published a blockbuster story about Facebook that exposed how the company used  so-called “ smear merchants ” to attack organizations critical of the platform. The story was shocking on a number of levels, revealing that Facebook’s hired guns stooped to dog-whistling, anti-Semitic attacks aimed at George Soros [1] and writing stories blasting Facebook’s competitors on a news site they managed. As Techdirt points out, however, while the particulars are different, the basic slimy tactics are familiar . Any organization that runs public campaigns in opposition to large, moneyed corporate interests has seen some version of this “slime your enemies” playbook. What is different here is that Facebook, the company seeking to undermine its critics, has a powerful role in shaping whether and how news and information is presented to billions of people around the world. Facebook controls

EFF: Questions We Should Be Asking About Facebook’s Smear Campaign Against Its Critics

Questions We Should Be Asking About Facebook’s Smear Campaign Against Its Critics The New York Times published a blockbuster story about Facebook that exposed how the company used  so-called “ smear merchants ” to attack organizations critical of the platform. The story was shocking on a number of levels, revealing that Facebook’s hired guns stooped to dog-whistling, anti-Semitic attacks aimed at George Soros [1] and writing stories blasting Facebook’s competitors on a news site they managed. As Techdirt points out, however, while the particulars are different, the basic slimy tactics are familiar . Any organization that runs public campaigns in opposition to large, moneyed corporate interests has seen some version of this “slime your enemies” playbook. What is different here is that Facebook, the company seeking to undermine its critics, has a powerful role in shaping whether and how news and information is presented to billions of people around the world. Facebook control