The most fascinating and odd technology stories of 2018
The volatile year of the technology world was gradually over, now is the time for us to sit together, 'gossip' about how many stories or technology events cost us ink of technology commentators over the past year.It must be said that choosing the best and most bizarre technology stories that took place during the year is not easy at all, especially when you have so many things to choose from.Instead of trying to retain all the outstanding events in a lengthy article as we have done in the past, we only selected 10 most representative events according to our subjective opinion.From quantum computing to smart drones, to silly guys in cyber security and AI development, it can be said that this is an exciting year of the technology world.Let's see what those events are!
Technology story 2018
- Delivery of coffee by unmanned aircraft
- Airport security systems are not "as good" as we thought
- Network security risks are present even on fighter jets
- Email scam $ 12 billion
- Quantum computing
- Mirror, mirror, on the wall.
- The toilet is also equipped with Bluetooth
- Artificial intelligence combined with real intelligence
- Elon Musk's satellite constellation
- Berners-Lee wants privacy to be highly respected on websites
Delivery of coffee by unmanned aircraft
The first is a pretty cool story about IBM and plans to use drones to deliver their coffee.An idea is not bad at all!"Big Blue" has filed a patent for an unmanned aircraft specializing in coffee delivery, equipped with sophisticated sensors.In its patent application, IBM described how their system works like this: A cup of pre-made coffee will be hung on a small unmanned aircraft.And this electric shipper will fly to a designated area, which will be where the owner of the 'flying coffee' cup takes delivery.
This unmanned aircraft system is very smart.It can collect data about your location and time of day.If it sees a trend, suppose you feel tired at 3 pm, the system can make a coffee delivery at that time for you every day that you don't need to ask for in advance.Is this interesting system commercialized?Let's wait for a while longer!
Airport security systems are not "as good" as we thought
Our next story should be in the category of 'real stranger' and it comes from London.The story is that on a beautiful day of 2018, a man who was on the way to the library was on the way, accidentally kicking a USB of someone who dropped on the sidewalk.Fortunately, our guy is also a curious person, so he tried to boot this USB.The tragedy is that he discovered that there was all the confidential information on London's Heathrow airport, including procedures for securing the Queen and tourists or materialists. other important.There is also a map of the location of all sealed cameras at the airport, as well as a map of the tunnel system and a secret exit to Heathrow Airport's Heathrow Express train station.
The story is complete when the office of the Information Commissioners Office (ICO) has decided to punish the owner of the airport management company Heathrow - Heathrow Airport Limited about $ 154,000 for not being able to secure the data. Personal hosting on their network is properly secured.Another report also showed that the ICO discovered that only 2% of the 6,500 employees working at Heathrow Airport Limited had been trained in data protection.
The ICO also gives businesses general attention to the "widespread" use of mobile storage media while ignoring data security guidelines and policies, while negligently controlling preventing employees from downloading personal data on unknown or unencrypted storage media.Needless to say, there was a "blood change" in the security system at Heathrow.What about the fate of the guy who likes to explore, we still cannot know and ask for permission to update later.
Network security risks are present even on fighter jets
Speaking of security issues, in 2018, there were many reports of potential vulnerabilities in network systems related to support for Lockheed Martin F-35 Lightning II, one Next-generation bombardment for the US military.
In an interview with Defense News, General Stephen Jost, director of the US Air Force's F-35 integrated technology center, said that some US military aircraft are currently active. It is based on software, and any software-based platform is likely to become a lure for hackers.
The problem is not with aircraft support network systems.According to Popular Mechanics, each F-35 squadron of any nation will be equipped with an Autonomic Logistics Information System (ATIS), including 13 connected servers. with ALIS network worldwide.Each individual F-35 jet will send logistics data back to its Central Point of Entry, then Central Point of Entry will transfer this information to the server system. Center of Lockheed in Fort Worth, Texas.In fact, ALIS sent so much data back that some countries were worried that ALIS might provide too much information about the activities of their F-35s.
Another networked system called Joint Reprogramming Enterprise - JRE will be responsible for maintaining a shared library of potential sensors and weapons systems distributed to F-35 fleets worldwide, according to Popular Mechanicalics.F-35 countries around the world are currently trying to tighten the security belts around any potential vulnerabilities in their systems.
Email scam $ 12 billion
This is a crazy scam, especially because it has been going on for so long.Specifically, this scam is called a business email compromise (BEC).The FBI said it had calculated more than $ 12 billion after a BEC hit.This nefarious amount is from nearly 80,000 victims, from 2016 to the present.BEC scams are still growing and developing further, targeting individual and business deals.
Specifically, the FBI said from December 2016 to May 2018, the loss caused by BEC increased 136%.Information on scams has been reported in all 50 states of the United States and 150 countries worldwide.The victim's complaint was filed with the FBI's Internet Crime Complaint Center, and financial statistics showed fraudulent transfers were made to 115 countries and territories. .
The FBI said that the scam had been "cherished" for years but was often only done when an attacker violated legitimate business email accounts through multiple sources, especially computer-to-computer technology. Current unauthorized money transfer.A variant of this type of phishing is concerned with infringing on a legitimate business email account and requesting personal identification information (PII) or W-2 income tax forms as well as personal wages. tablets.
Quantum computing
It will take a few more years for this technology to really "storm", but it is interesting to hear Gartner's analysis of the power of quantum computers will be widely developed in the near future at the association. Last symposium / IT exhibition Symposium / IT Expo.
It can be said that this is one of the breakthrough technologies with leading potential in about five years.Gartner analysts said.The use of quantum computing services or quantum computing to solve difficult problems and offer new applications will be the cornerstone of the future IT world.Parallel execution and exponential scalability of quantum computers means that this technology will have an outstanding advantage in solving too complex problems for traditional methods or when one Traditional algorithms will take too long to find solutions.
The automotive industry and sectors such as finance, insurance, pharmaceuticals, military and related research industries will benefit the most from advances in quantum computing.According to Gartner, businesses and organizations operating in these areas should actively explore and follow up on quantum computing technology at least from now and at the latest in 2022, to be able to take to exploit this technology from 2023 or 2025. In addition, companies should take the lead off by taking advantage of available technologies such as QCaaS, GitHub tools and SDK.
Meanwhile, back in time, at the end of the year, Harvard announced the Harvard Quantum Initiative (HQI) to create a new scientific community, combined with efforts from nations. In order to promote progress in quantum technology - technology will change the world in the near future.
- New chip technology can enhance quantum computing
Mirror, mirror, on the wall.
University of Melbourne researchers say they have built what they call biometric mirrors, using artificial intelligence to detect as well as show characteristics of physical and physical attractiveness. Everyone's based on a photo of their face.It sounded like a magic mirror in 'Snow White and the Seven Dwarfs' ?!
Specifically, this mirror can express 14 biometric features ranging from gender, age and ethnicity to the attractiveness, unrest and stability in one's emotions.Researchers say that the longer a person stands in front of a mirror, the more likely their individual traits will be expressed.
"Our research aims to encourage challenging questions about the boundaries of AI. It shows users how improper use of AI can have consequences for society, as well as contribute. Help people better understand the moral story behind AI, 'said Dr. Niels Wouters from the Center for Social Natural User Interfaces (SocialNUI) and Melbourne Science Gallery.
- It's time to face the "reverse side" of face recognition technology
The toilet is also equipped with Bluetooth
A combination that sounds irrelevant but has been successfully implemented in 2018, is integrating wireless technologies into the toilet.
At the world's leading technology event CES took place at the beginning of the year, a company specializing in the production and sales of porcelain products, Kohler Numi, introduced a rather unique technology, providing fish settings. The multiplier allows users to adjust every option equipped on their . toilet according to their exact preferences, from ambient light colors to the ability to sync music via Bluetooth and wireless technologies to heating. Warm seat and footrest.With this modern toilet, you can play your favorite music and podcasts through wireless broadcast settings with any device connected by Bluetooth technology, as well as storing MP3 files to an SD card or Plug your device in with the auxiliary cable.
Other upgrades include power-save mode to save energy, emergency flushing when power is out and remote control with an intuitive touch screen.From the above features and effectiveness, this Numi toilet sign represents a new standard, excellent in the comfort of bathroom equipment, in other words, Kohler Numi has upgraded the experience . go. Humanity's hygiene to a new level!
Artificial intelligence combined with real intelligence
When it comes to securing network security, the combination of human expertise and intelligence with the artificial intelligence of an advanced computer system can be unbelievably beneficial.
That is the result of a research project published in 2019 by the research agency Defense Advanced Research Projects Agency (DARPA).According to DARPA spokesperson, the purpose of a combination of computer systems from DARPA and Humans Exploring Software Security (CHESS) is to go beyond the manual-controlled human security process. Based on advanced collaboration between computers and people to combat emerging threats of network security.
The basic idea is to integrate traditional computer tools with artificial intelligence to create techniques to address vulnerable classes that are currently hampered by information gaps and require thorough understanding of people and contextual inferences.Listening through seems a bit confusing, but the actual operation is not too complicated because it was undertaken by AI in most stages.Think about which brighter future of cyber security!
Elon Musk's satellite constellation
Elon Musk has no shortage of ambitious, ambitious projects - from bringing people to Mars to building a super-fast train, and recently, the young billionaire turned a green light on another big plan. : A satellite-based low-cost broadband Internet service called StarLink.
- Details of the plan to turn a successful Mars man for only $ 100,000 by Elon Musk
Specifically, in November, Elon Musk received a firm nod from the FCC to be allowed to add 7,518 satellites to the space to form the StarLink constellation, including nearly 12,000 satellites he needs to launch into orbit. in the next six years according to the plan (currently there are 4,425 authorized satellites).
SpaceX intends to let satellites fly in orbit at low altitude, falling to about 346km above the ground.According to a report, the reason SpaceX cares about such low orbit is to shorten the latency between satellites and internet users on the earth and thus, help speed up web surfing.Currently there are no satellites actually put into use, but the problem will only be in time!
- Elon Musk's Starlink network is capable of imbalancing the global network economy
Berners-Lee wants privacy to be highly respected on websites
Last fall, a technology company called Inrupt was launched with two key factors, as well as prominent figures in the technology world, Sir Tim Berners-Lee (chief technology officer). and John Bruce (formerly of IBM Resilient security company) as CEO.Inrupt's goal is to give users greater control over their personal data and more importantly their own information.The focus of Inrupt is Solid, an open source software project that Berners-Lee is hatching.
'Hardware will contribute to changing the current information security model - where users must hand over their personal data to digital technology companies in exchange for other experience values, and In this regard, users will be completely at a disadvantage, 'Bern Berners-Lee shared on the blog about his breakthrough plan details.Hardware is the platform that Inrupt uses for web development to restore the balance between information security and user benefits.
The idea is that users will put all their data, from photos to phone numbers and other information in a personal online data warehouse (POD).Berners-Lee said that in this way, Solid allows users to freely choose where to store data, which specific people and groups can access the selected elements and which applications they will use.In addition, it also allows you, your family and colleagues to link and share data with anyone, and allow everyone to view a data with different applications at the same time.
Obviously, for Solid to grow widely, it will take a lot more effort and entail Google, Facebook, and other web-based customer services, but Berners-Lee has great faith in the Success of this project, please wait and see!
These are 10 exciting technology events that took place in 2018.Do you see any other outstanding events that need to be added to the list?Leave comments in the comment section below!Wish you have a successful new year!
See more:
- A look at Google's 2018: A year of volatility
- This is 5 quality smartphones, but not noticed in 2018
- How is the process of capturing billions of Pixel photos?
- 5G smartphones will be released in 2019
You should read it
- Quantum computing - a marathon, not a sprint contest!
- Quantum computing - the future of humanity
- From Elon Musk to Satya Nadella: This is a list of the top 29 CEOs of the technology world in 2018
- How much time does Elon Musk run for two famous technology companies?
- Quantum encryption - Future security technology
- Even Bill Gates doesn't understand the algorithm behind quantum computing
- Top 3 technology trends in 2018, which technology will change the game?
- 16 secrets are less known about tech village 'Iron Man' Elon Musk
- Join Microsoft's free Quantum computing course today
- What you need to know about an information security analyst
- Unmanned aircraft help predict volcanic eruptions
- Summary of the hottest technology news of April 2, 2015
Maybe you are interested
Bluetooth 6.0 brings new technology that helps Apple improve Find My network
Cerebras Launches World's Fastest AI Inference Technology, 20x Performance Than NVIDIA
Unusual habits of technology billionaires
Realme is about to announce the world's fastest charging technology 320W SuperSonic
New battery technology may soon replace lithium-ion
When should you restart technology devices?