Archive for ‘Technology’

January 28, 2014

Guccifer

guccifer

Marcel Lazăr Lehel (b. 1974) is a Romanian hacker known as Guccifer, who was responsible for a number of high-level security breaches involving both current and former members of the United States government. He was arrested in early 2014 by Romanian authorities. The hacker first appeared in news media in 2013 after ‘The Smoking Gun’ reported he was responsible for hacking the AOL account of Dorothy Bush Koch, sister of former president George W. Bush.

Family photos of former president George H. W. Bush, who was in the hospital at the time, were circulated to the internet. He also circulated a self-portrait painted by George W. Bush, depicting the former president taking a shower. Guccifer went on to hack a number of AOL, Yahoo, Flickr and Facebook accounts, giving him access to information about current and former high-level government officials.

read more »

Tags: ,
January 27, 2014

CuteCircuit

tshirtos

CuteCircuit is a fashion company based in London founded in 2004 by Ryan Genz and Francesca Rosella that designs wearable technology and interactive fashion. The company is among the first in fashion to offer smart textile-based garments with micro electronics. CuteCircuit designs dresses and costumes for international artist special performances or tours. Such as, Katy Perry’s catsuit for her performance on ‘American Idol,’ U2 leather jackets for their ‘U2 360 Tour,’ and Azealia Banks’ mermaid dress.

The Kinetic Dress, designed  in 2004, lights up and changes its patterns following the person’s movement. The Hug Shirt is a t-shirt that recreates the sensation of touch, warmth, and emotion of a hug from the distant one using Bluetooth and sensors technology. The 2008 M Dress accepts a standard SIM card and allows to make and receive calls. Designed in partnership with Ballantine’s, TshirtOS is the world’s first t-shirt, that can be programmed by an iOS app to show images and texts, play music, take photos and share them.

Tags: ,
January 24, 2014

Cryptonomicon

robert bobby shaftoe by ben towle

Cryptonomicon is a 1999 novel by American author Neal Stephenson depicting the exploits of two groups of people in two different time periods, presented in alternating chapters. The first group is World War II-era Allied codebreakers and tactical-deception operatives affiliated with the Government Code and Cypher School at Bletchley Park in the UK and disillusioned Axis military and intelligence figures whom they encounter.

The second narrative is set in the late 1990s with descendants of the first narrative’s characters employing cryptologic, telecom, and computer technology to build an underground data haven in the fictional Sultanate of Kinakuta. Their goal is to facilitate anonymous Internet banking using electronic money and (later) digital gold currency, with a longer range objective to distribute Holocaust Education and Avoidance Pod (HEAP) media for instructing genocide-target populations on defensive warfare.

read more »

Tags: ,
January 20, 2014

Snow White Design Language

esslinger

The Snow White design language was an industrial design language (an overarching scheme or style that guides the design of a complement of products) developed by German-American industrial designer Hartmut Esslinger’s Frog Design. Used by Apple Computer from 1984 to 1990, the scheme has vertical and horizontal stripes for decoration, ventilation, and the illusion that the computer enclosure is smaller than it actually is.

The design language boosted Apple’s global reputation, set design trends for the computer industry, and molded the perception of computers in the manufacturing and business world. Among other design features, Esslinger’s presentation of the Apple logo—a three-dimensional logo inlaid into the product case with the product name printed onto its surface—was included on nearly every product for several years.

read more »

January 14, 2014

Edge Foundation

The Edge Foundation, Inc. is an association of science and technology intellectuals created in 1988 as an outgrowth of The Reality Club (as a group of mostly New York City-based intellectuals that met regularly from 1981 through 1996 for seminars on a variety of topics). Currently, its main activity is contributing to the edge.org website, edited by publisher and businessman John Brockman. The site is an online magazine exploring scientific and intellectual ideas. Many areas of academic work are incorporated, including genetics, physics, mathematics, psychology, evolutionary biology, philosophy and computing technology.

Brockman’s 1995 book ‘The Third Culture,’ which has been influential to the foundation, describes the growing movement towards (re)integration of literary and scientific thinking and is a nod toward British scientist C. P. Snow’s concept of ‘The Two Cultures’ of science and the humanities. At the Edge website scientists and others are invited to contribute their thoughts in a manner readily accessible to non-specialist readers. In doing so, leading thinkers are able to communicate directly with each other and the public without the intervention of middlemen such as journalists and journal editors.

January 6, 2014

Pelican Products

pelican case

Pelican Products is an American multinational company based out Torrance, California that designs and manufactures flashlights and cases. Their products are used in many industries including military, law enforcement, fire safety and entertainment. Pelican has over 1,300 employees and operates offices across the globe. The company was founded in Torrance, California in 1975 as a mail-order home business offering unique and practical products for the dive market.

Today, Pelican is known for molded plastic containers that seal with an airtight and watertight gasket. They include a barometric relief valve made of Gore-Tex to prevent pressure damage to the case, during transportation or when the air pressure in the environment changes. Pelican cases meet military standards for waterproofing, stacking, impact, and durability, and feature a lifetime guarantee.

read more »

Tags:
January 6, 2014

Tobii Technology

eyex

Tobii

Tobii Technology is a Swedish high-technology company that develops and sells products for eye control and eye tracking. Founded in 2001, the company has products in several market segments such as people with communication disabilities who use Tobii’s technical devices and language tools (AAC devices) to communicate.

It also has products that are widely used for research in the academic community, and to conduct usability studies and market surveys of commercial products. Tobii also partners with others to integrate eye tracking and eye control in different industry applications and fields such as advanced driver assistance, consumer computing, and gaming.

Tags:
January 5, 2014

Format War

vhs vs beta

A format war describes competition between mutually incompatible proprietary formats that compete for the same market, typically for data storage devices and recording formats for electronic media.

It is often characterized by political and financial influence on content publishers by the developers of the technologies. Developing companies may be characterized as engaging in a format war if they actively oppose or avoid interoperable open industry technical standards in favor of their own.

read more »

December 20, 2013

Scareware

scareware by Scott Pollack

Scareware, nowadays included into the class of malware known as FraudTool, comprises several classes of ransomware or scam software with malicious payloads, usually of limited or no benefit, that are sold to consumers via certain unethical marketing practices. The selling approach uses social engineering to cause shock, anxiety, or the perception of a threat, generally directed at an unsuspecting user. Some forms of spyware and adware also use scareware tactics.

A tactic frequently used by criminals involves convincing users that a virus has infected their computer, then suggesting that they download (and pay for) fake antivirus software to remove it. Usually the virus is entirely fictional and the software is non-functional or malware itself. Another approach is to trick users into uninstalling legitimate antivirus software, or disabling their firewall.

read more »

Tags:
December 19, 2013

Ransomware

ransom

Ransomware comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed.

Some forms of ransomware encrypt files on the system’s hard drive (cryptoviral extortion), while some may simply lock the system and display messages intended to coax the user into paying. While initially popular in Russia, the use of ransomware scams has grown internationally.

read more »

Tags:
December 10, 2013

Biological Wheel

curl

Rotating locomotion encompasses two distinct modes of locomotion: simple rolling, and spinning relative to a fixed axle or body in the manner of a wheel or propeller. Several organisms move by rolling.

However, despite the integral role that the wheel has played in locomotion of vehicles designed by humans, true wheels do not appear to play any role in the locomotion of biological systems.

read more »

December 5, 2013

Personal Genomics

Personal genomics [jee‐noh-miks] (sequencing and analysis of the genome of an individual) employs several techniques, including single-nucleotide polymorphism (SNP) analysis chips (typically 0.02% of the genome), or partial or full genome sequencing. Once the genotypes are known, the individual’s genotype can be compared with the published literature to determine likelihood of trait expression and disease risk. 

Automated sequencers have increased the speed and reduced the cost of sequencing, making it possible to offer genetic testing to consumers. 23andMe sells mail order kits for SNP genotyping. The information is stored in a user profile and used to estimate the genetic risk of the consumer for over 240 diseases and conditions, as well as ancestry analysis.

read more »