120 research outputs found

    Hackers: a case-study of the social shaping of computing

    Get PDF
    The study is an examination of hacking, placing the act in the context of theories of technological change. The account of hacking is used to substantiate those theories that emphasise the societal shaping of technology over the notion of technological determinism. The evolution of hacking is traced, showing how it reflects changing trends in the nature of information: the most vivid of these is the conceptualisation of information known as 'cyberspace'. Instead of simply cataloguing the impact of technical changes within computing, and the effects they have had upon information, the study shows how technical change takes place in a process of negotiation and conflict between groups.The two main groups analysed are those of the Computer Underground (CU) and the Computer Security Industry (CSI). The experiences and views of both groups are recounted in what constitute internalist and externalist accounts of hacking and its significance. The internalist account is the evidence provided by hackers themselves. It addresses such issues as what motivates the act of hacking; whether there is an identifiable hacking culture; and why it is almost an exclusively male activity. The externalist account contains the perceptions of hacking held by those outside the activity.The state of computing's security measures and its vulnerability to hacking is described, and evidence is provided of the extent to which hacking gives rise to technical knowledge that could be of potential use in the fixing of security weaknesses. The division within the CSI between those broadly cooperative with hackers and those largely hostile to them is examined, and the reasons why hacking knowledge is not generally utilised are explored. Hackers are prevented from gaining legitimacy within computing in a process referred to as 'closure'. Examples include hackers being stigmatised through the use of analogies that compare their computing activities to conventional crimes such as burglary and tresspass.Stigmatisation is carried out by the CSI who use it in a process of professional boundary formation to distinguish themselves from hackers. It is also used by other authority figures such as Members of Parliament whose involvement in the process of closure takes the form of the anti-hacking legislation they have passed, an analysis of which concludes this study

    Clearing the smoke: The changing identities and work in firefighting

    Get PDF
    The impact of computing devices on the nature of work has been a long-standing topic of inquiry. Removing the boundaries of traditional corporate organizations, the evolution from fixed ICT to mobile IoT has enabled a technology driven future, taking transformative technology off the desk and placing it in the field. The exponential increase, in mobility and reduction in cost have expanded accessibility to whole new categories of work including emergency response, manufacturing, and construction. There is a need to revitalize organizational studies alongside emerging technologies as new structures and environments make the kinds of initial questions in organizational studies relevant again. We present a qualitative investigation examining the implementation of a wearable device into two fire departments in the Southeastern United States. Our analysis demonstrates the importance of understanding how these types of new digital technologies impact organizations and shape how we educate and train the next generation workforce.M.S

    Enhancement to the patient's health care image encryption system, using several layers of DNA computing and AES (MLAESDNA)

    Get PDF
    Keeping patient health data private has been a big issue for decades, and this issue will not go away anytime soon. As an integral part of many developing technologies, cryptographic Internet communications ICs (e.g. fog computing and cloud computing) are a main focus of IoT research. Just keep trying all the potential keys until you find the correct one. New and future technologies must have a model of DNA cryptography in order to assure the efficient flow of these technologies. Public-key cryptography is also required to make DNA sequence testing devices for the Internet of Things interoperable. This method employs DNA layers and AES in such a way that it may be easier to design a trustworthy hybrid encryption algorithm that uses DNA layers and AES. In order to guard against brute-force decryption attacks, DNA sequences are encrypted using three keys: (I) the main key, which is the key to the AES encryption algorithm; (II) the rule 1 key, which is the base DNA structure; and (III) the rule 2 key, which is the DNA helical structure binding probability. This key was created with increased security in mind. multi-layered AES encryption and DNA computing were applied to "Covid 19" images in this research (MLAESDNA). With cloud computing, the MLAESDNA team was able to show that IoT signals could be enhanced with encrypted data

    TPU v4: An Optically Reconfigurable Supercomputer for Machine Learning with Hardware Support for Embeddings

    Full text link
    In response to innovations in machine learning (ML) models, production workloads changed radically and rapidly. TPU v4 is the fifth Google domain specific architecture (DSA) and its third supercomputer for such ML models. Optical circuit switches (OCSes) dynamically reconfigure its interconnect topology to improve scale, availability, utilization, modularity, deployment, security, power, and performance; users can pick a twisted 3D torus topology if desired. Much cheaper, lower power, and faster than Infiniband, OCSes and underlying optical components are <5% of system cost and <3% of system power. Each TPU v4 includes SparseCores, dataflow processors that accelerate models that rely on embeddings by 5x-7x yet use only 5% of die area and power. Deployed since 2020, TPU v4 outperforms TPU v3 by 2.1x and improves performance/Watt by 2.7x. The TPU v4 supercomputer is 4x larger at 4096 chips and thus ~10x faster overall, which along with OCS flexibility helps large language models. For similar sized systems, it is ~4.3x-4.5x faster than the Graphcore IPU Bow and is 1.2x-1.7x faster and uses 1.3x-1.9x less power than the Nvidia A100. TPU v4s inside the energy-optimized warehouse scale computers of Google Cloud use ~3x less energy and produce ~20x less CO2e than contemporary DSAs in a typical on-premise data center.Comment: 15 pages; 16 figures; to be published at ISCA 2023 (the International Symposium on Computer Architecture

    Pervasive Computing: Embedding the Public Sphere

    Full text link

    Vypracování projektové dokumentace v metodě BIM

    Get PDF
    The thesis aims to plan and designing of a two-story building and submission the model And drawings to the common CDE data environment. Also, prepare the engineering report based on Decree No. 499/2006 Coll. - Level of Development LOD 4. The first part of the thesis consists of general information about BIM.BIM in the Czech Republic, Roles and responsibilities, Software for designing building information model and advantages and disadvantages of BIM The general part consists of details of the plans of each story, groundwork, foundation, roof, ceiling, section, and elevation of the building I have designed. The technical task was developed for the designing of the BIM model for all project stages and parts and contains requirements to levels of development for each stage of a construction project. In the process of writing the thesis, a conclusion was made on how to use BIM more effectively in future projects. And how I implemented the BIM method in my construction design. For Using the Building information model more effectively the company should start to implement the technology in all phases of construction. Such as planning, Designing,Construction, maintenance, and demolition of the infrastructure. These processes will enable the utilization of Building Information Modelling's benefits at all phases of the object's life cycleThe thesis aims to plan and designing of a two-story building and submission the model And drawings to the common CDE data environment. Also, prepare the engineering report based on Decree No. 499/2006 Coll. - Level of Development LOD 4. The first part of the thesis consists of general information about BIM.BIM in the Czech Republic, Roles and responsibilities, Software for designing building information model and advantages and disadvantages of BIM The general part consists of details of the plans of each story, groundwork, foundation, roof, ceiling, section, and elevation of the building I have designed. The technical task was developed for the designing of the BIM model for all project stages and parts and contains requirements to levels of development for each stage of a construction project. In the process of writing the thesis, a conclusion was made on how to use BIM more effectively in future projects. And how I implemented the BIM method in my construction design. For Using the Building information model more effectively the company should start to implement the technology in all phases of construction. Such as planning, Designing,Construction, maintenance, and demolition of the infrastructure. These processes will enable the utilization of Building Information Modelling's benefits at all phases of the object's life cycle222 - Katedra městského inženýrstvídobř

    Visual Programming: Concepts and Implementations

    Get PDF
    The computing environment has changed dramatically since the advent of the computer. Enhanced computer graphics and sheer processing power have ushered in a new age of computing. User interfaces have advanced from simple line entry to powerful graphical interfaces. With these advances, computer languages are no longer forced to be sequentially and textually-based. A new programming paradigm has evolved to harness the power of today's computing environment - visual programming. Visual programming provides the user with visible models which reflect physical objects. By connecting these visible models to each other, an executable program is created. By removing the inherent abstractions of textual languages, visual programming could lead computing into a new era

    Low-power emerging memristive designs towards secure hardware systems for applications in internet of things

    Get PDF
    Emerging memristive devices offer enormous advantages for applications such as non-volatile memories and in-memory computing (IMC), but there is a rising interest in using memristive technologies for security applications in the era of internet of things (IoT). In this review article, for achieving secure hardware systems in IoT, low-power design techniques based on emerging memristive technology for hardware security primitives/systems are presented. By reviewing the state-of-the-art in three highlighted memristive application areas, i.e. memristive non-volatile memory, memristive reconfigurable logic computing and memristive artificial intelligent computing, their application-level impacts on the novel implementations of secret key generation, crypto functions and machine learning attacks are explored, respectively. For the low-power security applications in IoT, it is essential to understand how to best realize cryptographic circuitry using memristive circuitries, and to assess the implications of memristive crypto implementations on security and to develop novel computing paradigms that will enhance their security. This review article aims to help researchers to explore security solutions, to analyze new possible threats and to develop corresponding protections for the secure hardware systems based on low-cost memristive circuit designs

    Columbia Chronicle (03/25/1996)

    Get PDF
    Student newspaper from March 25, 1996 entitled The Chronicle of Columbia College Chicago. This issue is 16 pages and is listed as Volume XXIX, Number 20. Cover story: Celebration embraces women and the arts Editor in Chief: Nancy Laichashttps://digitalcommons.colum.edu/cadc_chronicle/1347/thumbnail.jp
    corecore