120 research outputs found
Hackers: a case-study of the social shaping of computing
The study is an examination of hacking, placing the act in the
context of theories of technological change. The account of hacking is
used to substantiate those theories that emphasise the societal
shaping of technology over the notion of technological determinism.
The evolution of hacking is traced, showing how it reflects changing
trends in the nature of information: the most vivid of these is the
conceptualisation of information known as 'cyberspace'. Instead of
simply cataloguing the impact of technical changes within computing,
and the effects they have had upon information, the study shows
how technical change takes place in a process of negotiation and
conflict between groups.The two main groups analysed are those of the Computer
Underground (CU) and the Computer Security Industry (CSI). The
experiences and views of both groups are recounted in what
constitute internalist and externalist accounts of hacking and its
significance. The internalist account is the evidence provided by
hackers themselves. It addresses such issues as what motivates the
act of hacking; whether there is an identifiable hacking culture; and
why it is almost an exclusively male activity. The externalist account
contains the perceptions of hacking held by those outside the
activity.The state of computing's security measures and its
vulnerability to hacking is described, and evidence is provided of the
extent to which hacking gives rise to technical knowledge that could
be of potential use in the fixing of security weaknesses. The division
within the CSI between those broadly cooperative with hackers and
those largely hostile to them is examined, and the reasons why
hacking knowledge is not generally utilised are explored. Hackers
are prevented from gaining legitimacy within computing in a process
referred to as 'closure'. Examples include hackers being stigmatised
through the use of analogies that compare their computing activities
to conventional crimes such as burglary and tresspass.Stigmatisation is carried out by the CSI who use it in a process of
professional boundary formation to distinguish themselves from
hackers. It is also used by other authority figures such as Members
of Parliament whose involvement in the process of closure takes the
form of the anti-hacking legislation they have passed, an analysis of
which concludes this study
Clearing the smoke: The changing identities and work in firefighting
The impact of computing devices on the nature of work has been a long-standing topic of inquiry. Removing the boundaries of traditional corporate organizations, the evolution from fixed ICT to mobile IoT has enabled a technology driven future, taking transformative technology off the desk and placing it in the field. The exponential increase, in mobility and reduction in cost have expanded accessibility to whole new categories of work including emergency response, manufacturing, and construction. There is a need to revitalize organizational studies alongside emerging technologies as new structures and environments make the kinds of initial questions in organizational studies relevant again. We present a qualitative investigation examining the implementation of a wearable device into two fire departments in the Southeastern United States. Our analysis demonstrates the importance of understanding how these types of new digital technologies impact organizations and shape how we educate and train the next generation workforce.M.S
Enhancement to the patient's health care image encryption system, using several layers of DNA computing and AES (MLAESDNA)
Keeping patient health data private has been a big issue for decades, and this issue will not go away anytime soon. As an integral part of many developing technologies, cryptographic Internet communications ICs (e.g. fog computing and cloud computing) are a main focus of IoT research. Just keep trying all the potential keys until you find the correct one. New and future technologies must have a model of DNA cryptography in order to assure the efficient flow of these technologies. Public-key cryptography is also required to make DNA sequence testing devices for the Internet of Things interoperable. This method employs DNA layers and AES in such a way that it may be easier to design a trustworthy hybrid encryption algorithm that uses DNA layers and AES. In order to guard against brute-force decryption attacks, DNA sequences are encrypted using three keys: (I) the main key, which is the key to the AES encryption algorithm; (II) the rule 1 key, which is the base DNA structure; and (III) the rule 2 key, which is the DNA helical structure binding probability. This key was created with increased security in mind. multi-layered AES encryption and DNA computing were applied to "Covid 19" images in this research (MLAESDNA). With cloud computing, the MLAESDNA team was able to show that IoT signals could be enhanced with encrypted data
TPU v4: An Optically Reconfigurable Supercomputer for Machine Learning with Hardware Support for Embeddings
In response to innovations in machine learning (ML) models, production
workloads changed radically and rapidly. TPU v4 is the fifth Google domain
specific architecture (DSA) and its third supercomputer for such ML models.
Optical circuit switches (OCSes) dynamically reconfigure its interconnect
topology to improve scale, availability, utilization, modularity, deployment,
security, power, and performance; users can pick a twisted 3D torus topology if
desired. Much cheaper, lower power, and faster than Infiniband, OCSes and
underlying optical components are <5% of system cost and <3% of system power.
Each TPU v4 includes SparseCores, dataflow processors that accelerate models
that rely on embeddings by 5x-7x yet use only 5% of die area and power.
Deployed since 2020, TPU v4 outperforms TPU v3 by 2.1x and improves
performance/Watt by 2.7x. The TPU v4 supercomputer is 4x larger at 4096 chips
and thus ~10x faster overall, which along with OCS flexibility helps large
language models. For similar sized systems, it is ~4.3x-4.5x faster than the
Graphcore IPU Bow and is 1.2x-1.7x faster and uses 1.3x-1.9x less power than
the Nvidia A100. TPU v4s inside the energy-optimized warehouse scale computers
of Google Cloud use ~3x less energy and produce ~20x less CO2e than
contemporary DSAs in a typical on-premise data center.Comment: 15 pages; 16 figures; to be published at ISCA 2023 (the International
Symposium on Computer Architecture
Vypracování projektové dokumentace v metodě BIM
The thesis aims to plan and designing of a two-story building and submission the model And
drawings to the common CDE data environment. Also, prepare the engineering report based
on Decree No. 499/2006 Coll. - Level of Development LOD 4.
The first part of the thesis consists of general information about BIM.BIM in the Czech
Republic, Roles and responsibilities, Software for designing building information model and
advantages and disadvantages of BIM
The general part consists of details of the plans of each story, groundwork, foundation, roof,
ceiling, section, and elevation of the building I have designed.
The technical task was developed for the designing of the BIM model for all project stages
and parts and contains requirements to levels of development for each stage of a construction
project.
In the process of writing the thesis, a conclusion was made on how to use BIM more
effectively in future projects. And how I implemented the BIM method in my construction
design.
For Using the Building information model more effectively the company should start to
implement the technology in all phases of construction. Such as planning,
Designing,Construction, maintenance, and demolition of the infrastructure. These processes
will enable the utilization of Building Information Modelling's benefits at all phases of the
object's life cycleThe thesis aims to plan and designing of a two-story building and submission the model And
drawings to the common CDE data environment. Also, prepare the engineering report based
on Decree No. 499/2006 Coll. - Level of Development LOD 4.
The first part of the thesis consists of general information about BIM.BIM in the Czech
Republic, Roles and responsibilities, Software for designing building information model and
advantages and disadvantages of BIM
The general part consists of details of the plans of each story, groundwork, foundation, roof,
ceiling, section, and elevation of the building I have designed.
The technical task was developed for the designing of the BIM model for all project stages
and parts and contains requirements to levels of development for each stage of a construction
project.
In the process of writing the thesis, a conclusion was made on how to use BIM more
effectively in future projects. And how I implemented the BIM method in my construction
design.
For Using the Building information model more effectively the company should start to
implement the technology in all phases of construction. Such as planning,
Designing,Construction, maintenance, and demolition of the infrastructure. These processes
will enable the utilization of Building Information Modelling's benefits at all phases of the
object's life cycle222 - Katedra městského inženýrstvídobř
Visual Programming: Concepts and Implementations
The computing environment has changed dramatically since the advent of the computer. Enhanced computer graphics and sheer processing power have ushered in a new age of computing. User interfaces have advanced from simple line entry to powerful graphical interfaces. With these advances, computer languages are no longer forced to be sequentially and textually-based. A new programming paradigm has evolved to harness the power of today's computing environment - visual programming. Visual programming provides the user with visible models which reflect physical objects. By connecting these visible models to each other, an executable program is created. By removing the inherent abstractions of textual languages, visual programming could lead computing into a new era
Low-power emerging memristive designs towards secure hardware systems for applications in internet of things
Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and in-memory computing (IMC), but there is a rising interest in using memristive technologies for security applications in the era of internet of things (IoT). In this review article, for achieving secure hardware systems in IoT, low-power design techniques based on emerging memristive technology for hardware security primitives/systems are presented. By reviewing the state-of-the-art in three highlighted memristive application areas, i.e. memristive non-volatile memory, memristive reconfigurable logic computing and memristive artificial intelligent computing, their application-level impacts on the novel implementations of secret key generation, crypto functions and machine learning attacks are explored, respectively. For the low-power security applications in IoT, it is essential to understand how to best realize cryptographic circuitry using memristive circuitries, and to assess the implications of memristive crypto implementations on security and to develop novel computing paradigms that will enhance their security. This review article aims to help researchers to explore security solutions, to analyze new possible threats and to develop corresponding protections for the secure hardware systems based on low-cost memristive circuit designs
Columbia Chronicle (03/25/1996)
Student newspaper from March 25, 1996 entitled The Chronicle of Columbia College Chicago. This issue is 16 pages and is listed as Volume XXIX, Number 20. Cover story: Celebration embraces women and the arts Editor in Chief: Nancy Laichashttps://digitalcommons.colum.edu/cadc_chronicle/1347/thumbnail.jp
- …