Jump to content
Search In
  • More options...
Find results that contain...
Find results in...

jos

Member
  • Content Count

    1,205
  • Joined

  • Last visited

Awards


This user doesn't have any awards

1 Follower

About jos

  • Title
    Markovian Parallax Denigrate

Profile Information

  • Gender
    Male
  • Location
    :- Marianas Web
  • Interests
    All electronics and physics developments
  • Biography
    Education:
    MBA Engineering Management, MS Embedded System, PGCM, BS Electronics and Communication, Computer hardware and network engineering,
    Works
    Created: Pose invariance algorithm for biometry
    Created: Mathematical model in visual cryptography
    Worked on redefining environmental sustainability
    current hobby:
    working on string field theory
    Profession
    Worked as Planning Engineer Oil and Gas
    Worked as RnD engineer machine and pattern recognition
    Worked as Embedded Software engineer contract industrial projects
  • Occupation
    Cicada 3301

Recent Profile Visitors

1,689 profile views
  1. Netburst did have 31 pipeline..but skylake is 14..so I do not think that is the issue
  2. No instructions can be executed in less than a cycle but more instructions can be executed in a cycle
  3. For online video, HTML5 offers two things Flash does not: mobile capabilities and semantic markup. The growth of mobile engagement; the rise of Interactive Video for entertainment, advertising and shopping; and HTML5’s open structure all combine to create the future of an HTML5-based Web, leaving Flash to eventually shuffle into its place in the Retired Tech Hall of Fame . While mobile is the most obvious advantage of HTML5 over Flash, there’s a feature that lies in semantic structure that’s just as important and especially powerful for Interactive Videos based on HTML5. Web crawlers and search engines can’t see inside of Flash, which is a completely closed container, and they’ll never be able to. Why does that matter? With the semantic structure of Interactive Video, you can build projects using HTML5 that have multiple interrelated pieces that Web crawlers know how to understand. But with Flash, you’re getting a black box that, when crawled, shows up as just a Flash video without any extra information. Obviously there is issues in flash vulnerabilities that pops up very quickly. Source: Link
  4. <quote> whole project was called the Face of Litter Campaign. scientists at Parabon NanoLabs used Snapshot™ DNA phenotyping to analyze who had touched the various garbage samples, and this allowed them to make a digital drawing of the litterbug responsible for each individual piece. This technology has the ability to predict eye color, hair color, skin color, freckling, shape of the face, and a lot more about people just from a tiny amount of their DNA. it got people talking. In only two weeks, it managed to get 3.9 million engagements on social media, and $5 million in earned media coverage. This campaign was very successful by many measurements, but it does raise some ethical questions. The pictures that were shown were generated drawings of theoretical people, but is it appropriate to publicly shame people?</quote> Although it may be possible in Hong Kong..I do not see many countries doing it.. how can they use DNA without a warrant?? Is it ethical.. if such aggressive advertising is allowed then spams are also not an issue . Intention are good but approach not so much.. Source: Link
  5. <quote>The potential problem with Tor is that if an adversary gets enough nodes on the network, they can work together to track the progress of packets. They might not be able to tell exactly what is being sent, but they can put together a breadcrumb trail tying a user to traffic coming out of an exit node. A team of researchers led by MIT grad studentAlbert Kwon (with help from EPFL) aims to leapfrog Tor’s anonymizing technique with a brand new platform called Riffle. In addition to wrapping messages in multiple layers of encryption (the eponymous technique of Tor, “The Onion Router”), Riffle adds two extra measures meant to baffle would-be attackers. First, servers switch up the order in which received messages are passed on to the next node, preventing anyone scrutinizing incoming and outgoing traffic from tracking packets using metadata. Then comes a two-part measure to prevent a malicious server from simply replacing real messages with dummies and tracking a single target one. Messages are sent from the user to all servers, not just one — and outgoing messages must be signed with an independently verifiable mathematical proof that they are the ones the server received. This way, any server tampering with messages will be spotted at once. </quote> heart of the system is a series of servers called a mixnet. Each server permutes the order in which it receives messages before passing them on to the next. An adversary that had tracked the messages’ points of origin would have no idea which was which by the time they exited the last server. With onion encryption, the sending computer wraps each message in several layers of encryption, using a public-key encryption system like those that safeguard most financial transactions online. Each server in the mixnet removes only one layer of encryption, so that only the last server knows a message’s ultimate destination. To thwart message tampering, Riffle uses a technique called a verifiable shuffle. Because of the onion encryption, the messages that each server forwards look nothing like the ones it receives; it has peeled off a layer of encryption. But the encryption can be done in such a way that the server can generate a mathematical proof that the messages it sends are valid manipulations of the ones it receives. Verifying the proof does require checking it against copies of the messages the server received. So with Riffle, users send their initial messages to not just the first server in the mixnet but all of them, simultaneously. Servers can then independently check for tampering. As long as one server in the mixnet remains uncompromised by an adversary, Riffle is cryptographically secure. Source :Link
  6. <quote> UN declares online freedom to be a human right that must be protected A new resolution from the UN comdemns countries that deliberately disrupt the internet access of their citizens Emma Boyle 7 hours ago 0 comments The United Nations Human Rights Council has passed a resolution for the “promotion, protection, and enjoyment of human rights on the internet” which condemns any country that intentionally disrupts the internet access of its citizens. The resolution stresses that “the same rights that people have offline must also be protected online” particularly with regards to the freedom of expression already protected by articles 19 of the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights. Though it was passed by consensus, the resolution was opposed by a small number of countries including Russia and China who wished to make a number of amendments, in particular aiming to delete calls for a "human rights based approach" for providing and expanding access to the internet and remove key references to the Universal Declaration of Human Rights and language on freedom of expression from the International Covenant on Civil and Political Rights.</quote> The United Nations Human Rights Council(UNHRC) is a United Nations System inter-governmental body whose 47 member states are responsible for promoting and protecting human rights around the world. Source: Link
  7. The vehicle relies on more than 30 sensors and streams of data from IBM's cloud. With Watson, passengers can ask about how the vehicle works, where they are going, and why Olli is making specific driving decisions. And it can answer the dreaded driver question "Are we there yet?" It also can offer recommendations for popular restaurants or historical sites based on the personal preferences of the passenger. Cognitive computing provides incredible opportunities to create unparalleled, customized experiences for customers, taking advantage of the massive amounts of streaming data from all devices connected to the Internet of Things, including an automobile's myriad sensors and systems]= The company said Las Vegas has purchased two of the vehicles and Miami-Dade County is exploring a pilot program in which several autonomous vehicles would be used to transport people around the Florida region. Rogers said the company has had discussions in at least 50 countries where there is interest in new transportation solutions. Source
  8. NetBIOS stands for Network basic input output system and is used in Windows for its file and printer sharing. It provides services related to the session layer allowing applications on separate computers to communicate. NetBIOS over TCP/IP (NetBT) sends the NetBIOS protocol over the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP). UDP port 137 ( used for name services Source: Link
  9. Bandwidth throttling is the intentional slowing of Internet service by an Internet service provider. It is a reactive measure employed in communication networks to regulate network traffic. This is really bad.. We are paying for a service and they are looting off our money without providing the promised service.. Hope this will be a lesson to all. I am sure, they will appeal.. Hope in the ongoing legal battle, supreme court full bench will be in favour of consumers.. Source: Link
  10. I think in future, they will be selling Marijuana online. Buy one fully organic.. Special Black Friday deal get a joint for 50% discount.. Amazon exclusive deal_ fresh and imported from Amsterdam. Source: Link
  11. I hope in time this can be mass produced. In developing countries the quality of water is decreasing on daily basis. I think these will be the future of water source. Source: Link
  12. Facebook is planning to track how many times a week you go to the grocery store, and every other store, and it will share that information with advertisers. Using the location services on your phone, Facebook will keep a tally of who goes to what stores, and show the anonymized numbers to advertisers, as evidence that buying ads on Facebook is getting people to visit brick-and-mortar businesses. It's a great thing for Facebook, which will now have excellent data to prove (or disprove) on a user-to-user basis what a store is getting for its advertising dollar. But it's a pretty frightening idea that a company will have information not unlike your credit card statement all from location services data. Source:Link
  13. In the late 1990s, his company, Cyber Promotions, aka Cyberpromo, was widely blacklisted as a source of unsolicited email. Wallace's high-profile pro-spam stance and unrepentant persistence earned him the derisive nickname 'Spamford'. Prior to his email spam ventures, Wallace had gained notoriety in other questionable marketing circles, as a heavy utilizer of junk fax marketing, a practice outlawed in the United States since 1991. In 1995, Wallace formed Cyber Promotions, entering the spam market. Thanks to a self-marketing campaign, Cyberpromo rapidly became the most successful seller of email marketing—as well as the number one source of unsolicited email. After Cyberpromo failed to become a legitimate business, Wallace returned to junk faxing in late 1997. Wallace's company brought a number of spam-blocking evasion tactics to the fore of the spam battle. False return addresses, relaying, and multihoming were among the questionable practices used by Cyberpromo to ensure the penetration of their advertising. Spam is bad because it shifts the cost of advertising to the recipients. It is similar to junk unsolicited faxes. It can also be compared to an unwanted collect call to your telephone. Spam is against the acceptable use policy/terms of service of every reputable ISP, is illegal in several US states, and can result in large portions of the Internet "shunning" your company at the network level e.g.: blocking packets or not accepting your e-mail. Source: Link
×