How does Siri work

How does Siri work

How does Siri work

How does Siri work

Apple’s Siri is still sassy, smart and periodically helpful.
However, the hell does it truly do the job?
“voice-recognition” is exactly what Siri does, however, those phrases do not disclose the method by which the device actually captures your voice words directly once you state, “send out an email into John: Proceed for yourself a shave, ” Linux Lover.”

The noises of one’s address proved instantly encoded to some streamlined digital variant that keeps its own information.
The sign by the connected mobile had been uninstalled wirelessly via a closeby mobile tower and also by way of a streak of property lines right back into a websites Provider at which it subsequently hauled having a waiter at the cloud, even filled using a succession of variations hardwired to understand speech.

Concurrently, your address has been assessed everywhere, in your own apparatus. Even a recognizer put in onto your own mobile communicates together with this machine at the cloud to automatically judge if the control could be managed everywhere — including like you’d questioned it to engage in with a song in your own cellphone — even whether it has to join into this system for additional aid. (When the neighborhood recognizer deems its version adequate to procedure the address, it informs the waiter at the cloud it’s no longer desired: “Thanks greatly, we are okay.”)

The host contrasts your address contrary to a statistical design to quote, depending on the noises that you talked and also the sequence in that you talked them everything characters could reflect. (In an identical period, the neighborhood recognizer contrasts your address to an abridged edition of this statistical version.) For equally, the highest-probability quotes receive the go-ahead.

Primarily based on these sorts of remarks, your address — currently known being a succession of vowels and consonants — will be subsequently explained to you a speech version, that quotes that the language your address is included of. Granted a decent amount of self-confidence, the pc then makes an applicant listing of requirements to get that which precisely the succession of phrases on your address could mean.

When there’s sufficient confidence in this outcome, also there’s clearly was that the pc determines your goal will be always to send out an SMS, ” Erica Olssen can be your own addressee (and her get hold of information needs to be hauled away from the cell phone’s contact record) along with the others would be your own real note for her along with your text-message looks onscreen, zero hands-free essential. If an address is overly ambiguous at any position throughout the method, the personal computers will probably increase for you personally, an individual: Does one believe Erica Olssen or Erica Schmidt?

EIN ORIGINAL

Go to Source

Cyber Security Challenge UK Appoints New CEO

Cyber Security Challenge

Cyber Security Challenge

Cyber Security Challenge UK today announced the appointment of a new chief executive following the death of former CEO Stephanie Daman, who passed away in June last year after a long battle with cancer.

Colin Lobley, who came through a thorough selection process of over 70 candidates, will now take up the role, joining from DXC Technology’s (formerly Hewlett Packard Enterprise), Security Services division where he was general manager, UK, Ireland, Middle East. Lobley will bring with him expertise in working with both public and private sector organizations.

“There are lots of exciting possibilities to diversify and expand this national initiative, so we can enhance the positive impact we have on the UK’s cyber resilience,” he said. “It would be fantastic if we could achieve such a utopian vision as having eradicated all security weaknesses in the cyber world…but realistically, if I go home every day knowing I have done something, directly or indirectly, to encourage people into the field of cyber, to enhance the knowledge of those in or entering the field, or to educate someone about cybersecurity and start to close those gaps; I’ll be happy.”

That’s exactly why I am delighted to be joining the fantastic, passionate team at Cyber Security Challenge UK, Lobley added, helping to make a real difference and building upon the wonderful efforts of the late Stephanie Daman.

“I fully believe that the UK cyber industry can go from strength to strength to become ever more prominent on the world stage,” he continued. “But to achieve this, it is essential that we nurture new talent, so we can meet the evolving market demands.”

Dr Robert Nowill, chairman of Cyber Security Challenge UK, said: “With his background, Colin fits the role very well as we forge the way ahead for our organization; developing our offering further whilst scaling up what we do to seek out as much new talent and staying as inclusive as possible. The Board and I also are extremely grateful for the work Nigel Harrison has done as Acting CEO for much of last year. We are pleased that Nigel continues as an Executive Director of The Challenge to help drive this exciting future.”

Read More Here

Article Credit: Info Security

Go to Source

Some TED Talks on technology you shouldn’t miss

Any sufficiently advanced technology is equivalent to magic. – Arthur C. Clarke (Author)

Here’s my selection of ‘TED Talks on technology you shouldn’t miss’. Be stirred, inspired and tech-ready for the future.

1) The future is here. In this talk, Jordan Duffy, a serial entrepreneur and technology innovation expert, explores how the internet of things is changing our lives in ways we don’t even recognise.

https://youtu.be/mzy84Vb_Gxk

Jordan Duffy is a serial entrepreneur, technology innovation expert and, at the age of 21, co-owns Buckham & Duffy, an innovation and rapid development firm with 18 employees. Jordan’s passion for technology and business started at home assembling computers, and his entrepreneurial journey started at age 14 with business partner Alex Buckham. Alex and Jordan have been growing businesses for eight years. Business aside, Jordan is an avid self-educator and driven change maker. He has seen 15 countries, battled cancer and chronic pain, and played drums on the Great Wall of China in the 2008 Olympic Orchestra.

______________________________________________________________________________

2) A handful of people working at a handful of tech companies steer the thoughts of billions of people every day, says design thinker Tristan Harris.

https://youtu.be/C74amJRp730

From Facebook notifications to Snapstreaks to YouTube autoplays, they’re all competing for one thing: your attention. Harris shares how these companies prey on our psychology for their own profit and calls for a design renaissance in which our tech instead encourages us to live out the timeline we want.

______________________________________________________________________________

3) When you hear the word “drone,” you probably think of something either very useful or very scary. But could they have aesthetic value?

https://youtu.be/RCXGpEmFbOw

Autonomous systems expert Raffaello D’Andrea develops flying machines, and his latest projects are pushing the boundaries of autonomous flight — from a flying wing that can hover and recover from disturbance to an eight-propeller craft that’s ambivalent to orientation … to a swarm of tiny coordinated micro-quadcopters. Prepare to be dazzled by a dreamy, swirling array of flying machines as they dance like fireflies above the TED stage.

______________________________________________________________________________

4) As we expect more from technology, do we expect less from each other?

https://youtu.be/t7Xr3AsBEK4

Sherry Turkle studies how our devices and online personas are redefining human connection and communication — and asks us to think deeply about the new kinds of connection we want to have.

______________________________________________________________________________

Facebook took 3.5 years to acquire 50 million customers, Whatsapp took 15 months, Angry Birds took 15 days.

By 2025, 2 billion people will have their first banking experience on their smart phone. 80% of these people will never walk in a bank branch.

Disruption across various industries and in different ways and as an island nation could this be an opportunity?

https://youtu.be/pk9RVBwiFbM

VIDIA MOONEEGAN is considered a pioneer of the Mauritius IT-BPO industry. He is the Senior Vice President and Managing Director of Ceridian, a cloud Human Capital Management software and services company. He is responsible for the Mauritius operations which employs some 800 associates. Vidia’s experience includes engaging partners globally to provide sourcing solutions. He has served as President of the outsourcing association of Mauritius and is a council member of Business Mauritius. His has worked for TNT Business Solutions, Schlumberger Oilfield Services and Arthur Andersen, UK.

___________________________________

Go to Source

From the IoT to BIM and DDoS to GDPR: Breaking down technological jargon

From the IoT to BIM and DDoS to GDPR

From the IoT to BIM and DDoS to GDPR

Biometrics

The U.S. Department of Homeland Security (DHS) describes biometrics as being “unique physical characteristics” that can be utilized for “automated recognition.” Think fingerprints, iris scans and voice recognition.

The applications of biometrics are diverse and wide ranging. Today, we can unlock our smartphones with our fingerprints and use our voices to gain access to sensitive information, such as our banking details.

For its part, the DHS says it uses biometrics to, among other things, “detect and prevent illegal entry into the U.S.” and enforce federal laws.

GDPR:

In the European Union, the General Data Protection Regulation will apply from May this year. It will update the 1995 Data Protection Directive, which was introduced at a time when the digital age was in its infancy, and will impact both citizens and businesses.

Among other things, the GDPR will boost people’s right to be forgotten and guarantee free, easy access to their personal data. Organizations and businesses will also have to inform people about data breaches that could negatively impact them, and do this “without undue delay.” Relevant data protection supervisory authorities will also need to be told of any breaches.

Go to Source

Streamlining IoT device provisioning

Streamlining IoT device provisioning

Streamlining IoT device provisioning

At this point, we’ve heard over and over about how big the Internet of Things (IoT) will be – estimates range up to 200 billion devices by 2020 (Source: Intel). That’s a lot of things we need to connect. Many of these devices will be in an enterprise setting with McKinsey estimating 70 percent of value to be captured by business-to-business applications like monitoring a gas pipeline, tracking building energy use, or measuring soil moisture on a farm – not the cool smart home gadgets like thermostats and refrigerators.

To reach these heady forecasts, there are a variety of challenges to overcome – one of which is how to provision and bring online all these new devices. The process of provisioning involves getting each device configured to send data to the right place and authenticate it on the network. This establishes a trusted identity for each device, be it a laptop, database, tiny sensor, or any other data producing or receiving node.

Provisioning is difficult and time consuming at large scale. We can all agree that typing in security tokens, configuring connectivity and installing firmware for tens of thousands of sensors on farms owned by a commercial grower will cost a lot and take a long time! Let’s look at how devices are configured and brought online now, and how we might be able to simplify and speed up this process in the future.

Embedded hardware for makers

For the makers community that works with raw embedded hardware like Raspberry Pis, Arduinos and BeagleBones, there’s a bit of manual work involved in getting data from a sensor to the cloud using an IoT platform. At a high level, the process includes:

  • Install an OS
  • Install firmware
  • Define the data format and who should receive the data
  • Create a virtual device in the platform device management dashboard
  • Apply a security key to the device for authentication
  • Configure network connectivity

Of course, this list is very simplified and inevitable troubleshooting will be required as each step has myriad possibilities – choose from many platforms, OSs, network protocols, etc. It’s easy to see why these do-it-yourself projects take a lot of tinkering, but this process isn’t meant to be scalable.

Consumer products

Most of us are more familiar with the process of getting a consumer product up and running. This generally involves downloading an app and going through a setup wizard. Setting up an Amazon Echo, for example, requires this process and is fairly painless as long as you’re only doing it once. Consumer products have actually done a really good job simplifying this process and making it as easy and fail-proof as possible, but a single uniform product connecting over WiFi only and not interacting with devices from other vendors is a bit simpler than what most IoT implementations will be looking for.

Read More Here

Article Credit: IOT Evolution

Go to Source

Alibaba’s AI Labs partners with MediaTek for IoT play

Alibaba's AI Labs partners with MediaTek

Alibaba’s AI Labs partners with MediaTek

Alibaba Group’s consumer artificial intelligence division, AI Labs, has teamed up with MediaTek to collaborate on internet of things (IoT) initiatives. Under the partnership, both the companies will collaborate on building smart home protocols, customized IoT chips and AI smart hardware. They also announced their Smartmesh connectivity solution in China, which supports many-to-many Bluetooth mesh technology.

Alibaba A.I. Labs, which leads the development of Alibaba’s consumer artificial intelligent (AI) products, and MediaTek, a global fabless semiconductor company, today announced a strategic collaboration in internet of things (IoT) initiatives including smart home protocols, customized IoT chips and AI smart hardware, with the aim of fostering the development of a connected world in the IoT era.

The two parties also announced the first Smartmesh connectivity solution in China that supports the latest many-to-many Bluetooth mesh technology, in an effort to speed up the adoption of this technology in smart home settings.

The solution, which is based on the Labs’ self-developed IoT protocol named IoT Connect and the Bluetooth chip co-developed by both parties, enables smart home devices to automatically pair with Tmall Genie, the Lab’s first voice-controlled smart assistant, leading up to a Tmall Genie-controlled smart home ecosystem.

Miffy Chan, Head of Alibaba A.I. Labs, commented: “We are excited about partnering with MediaTek to explore collaboration in the IoT ecosystem. Our AI and cloud computing capabilities, along with MediaTek’s cutting-edge technology in chip design, provide unique advantages to our connectivity solutions for smart homes, offering real benefits to consumers in China and paving the way to a more connected world through innovation.”

Jerry Yu, Corporate Vice President and General Manager of the Home Entertainment Business Group, MediaTek said: “MediaTek is thrilled to partner with Alibaba A.I. Labs in building up a voice-controlled smart home ecosystem. This follows our collaboration in delivering the great success of Tmall Genie X1.”

“The smart home market is undergoing tremendous growth as technologies advance. With MediaTek’s strength in connectivity and baseband, computing and multimedia, coupled with Alibaba’s leading advantages in cloud computing and AI, we are confident that the collaboration will mark a milestone in the development of the IoT era,” Yu added.

The partnership comes on the heels of the successful collaboration on Tmall Genie, for which MediaTech provides chip technology support. Alibaba A.I. Labs launched the smart home assistant in July last year, with an aim to provide brand new interaction experiences for Chinese consumers. Over one million Tmall Genie devices were sold in China during Alibaba’s Global Shopping Festival on November 11 last year.

Read More Here

Article Credit: Digit

Go to Source

How Location Technology And IoT Data Are Transforming Business

Location Technology And IoT Data

Location Technology And IoT Data

The growing number of connected devices has come to be referred to as the Internet of Things (IoT). The IoT is not just a random grouping of internet-enabled gadgets; it is a rapidly growing network able to capture vast amounts of data with fixed and moving sensors. Big data processing of these data—whether in real time or on data-at-rest—is the crucial component of extracting business value from modern analytics, in private or public services. Location plays an essential part of this. Spatial analytics technology gives us the ability to tie these massive amounts of information together by placing them within the critical context of where.

The subsequent spatial analysis can provide unique insights, revealing previously hidden patterns and relationships that drive stronger decision-making for businesses. Fed by spatial analytics and real-time data, location technology’s applications are broad, ranging from optimizing supply chain management to using real-time asset tracking for logistics to customer analytics in retail.

Meeting the Demands of Supply Chain

We tend to think of the Internet of Things as a network of sensors, but it can also as easily be the barcode on a clamshell package that holds produce. This creates visibility, not just of a shipment, but down to an individual stock keeping unit (SKU). IoT data in this respect can give a company fine-grain tracking and understanding of its assets, including perishable goods.

Packaged berries are enjoyed every day by millions of people. It is taken for granted that the strawberries and raspberries are fresh and of high-quality once they reach the supermarket in their familiar plastic containers. But the process of ensuring that only the best berries make it from the field to the grocer in top condition involves multiple locations, often spanning several different countries. Because products need to go from a farm all the way to a retail location in a limited period of time, agricultural companies must track information about their product as it moves from the field to a processing center, a distribution center, and then a retail location.

This information is used to understand not only where the product went in the supply chain and how long it took to get there, but also to analyze produce quality. For instance, this process enables one agricultural producer to understand why a particular batch of strawberries was superior. The company can see where that batch came from, right down to what part of the field. They can then look at how they treated that field differently so they can repeat this success in the future. The company is essentially performing analytics on the back end to help improve the product that they deliver to their customers. This application of IoT also pays dividends when it comes to reverse logistics. If a specific product needs to be recalled, a company that knows the product’s origins down to the SKU level can perform more selective recalls and avoid waste.

Read More Here

Article Credit: Forbes

Go to Source

Comcast Wants to Turn Xfinity Into an ‘Internet of Things’ Smart-Home Platform

Comcast Wants to Turn Xfinity Into an ‘Internet of Things’

Comcast Wants to Turn Xfinity Into an ‘Internet of Things’

Comcast is looking to turn Xfinity broadband into a kind of “home operating system,” promising to bring home-automation controls for hundreds of devices to Xfinity Internet customers at no extra cost.

The cable giant unveiled the new “Works With Xfinity” home-automation partner program at CES 2018 on Wednesday, showing off different ways it plans to let Xfinity customers use its TV and broadband services to control devices in a Wi-Fi-connected home. For example, a Comcast customer could use the X1 voice remote to say, “Good night” — and the system would automatically lock all the doors, turn off lights, adjust thermostats, and arm the home-security system.

The goal, for Comcast, is to get embedded into customers’ homes through the different IoT devices and provide useful features so they’ll be less likely to switch providers

“It’s another value of being an internet customer,” said Matt Strauss, Comcast Cable’s EVP of Xfinity services. “We see X1 as a platform… where in many ways we see the television as just being a screen for interacting with other devices in your home.”

Comcast offers some home-automation features already with its Xfinity Home security service, which has about 1 million customers. What’s different with the new program is that Comcast is decoupling automation from security: The new IoT features will be available to all 15 million of the cable operator’s broadband internet customers.

The IoT program keys off xFi, which provides a digital dashboard to set up their home Wi-Fi network, find their password, see what devices are connected, troubleshoot issues, set parental controls and manage other features. The xFi wireless gateways can be controlled via a mobile app, website and on the TV with the X1 voice remote. According to Comcast, since it was launched in May 2017, more than 4 million customers have used the new service.

Comcast also is tapping into the capabilities of Stringify, a tech startup it acquired in September 2017 that provides a network-based automation service that can connect with more than 500 IoT products and digital services.

The cable operator said Stringify’s technology will soon be integrated into Xfinity’s products and services, to let customers create and use rules and controls for device brands including August, Carrier, Chamberlain, ecobee, GE, Honeywell, Kwikset, Liftmaster, LIFX, Lutron, Nest, Netgear Arlo, Philips Hue, Danalock, Sengled, SkyBell, Tile, Yale, and Zen Ecosystems.

Read More Here

Article Credit: Variety

Go to Source

Improving sustainability: should miners turn to IoT?

Improving sustainability

Improving sustainability

The Internet of Things (IoT) has the potential to dramatically reduce the impact of mining operations on the environment, and environmental monitoring is now the number one driver of IoT in the sector, according to new research from mobile satellite company Inmarsat. Julian Turner reports.

The Internet of Things (IoT), which connects everything from domestic appliances to heavy machinery to the internet, has in less than 40 years gone from being an abstract concept to a reality across virtually every industry, including, belatedly, mining.

Having initially adopted a ‘fast follower’ approach to IoT technology, the notoriously risk-averse sector is finally waking up to the fact that data is now, arguably, its most precious commodity, with 40% of mining businesses now expecting to leverage the technology within the next 18 months.

IoT has the potential to improve safety, automate machinery operation, facilitate predictive rather than preventative maintenance, improve traceability and harness real-time data and analytics.

Multinationals Rio Tinto and BHP Billiton, for example, have set-up integrated remote operations centres in Perth, Australia, for monitoring iron ore operations 1,500km away in remote Pilbara.

Experts in Rio Tinto’s processing excellence centre in Brisbane monitor and analyse real-time data, providing solutions to optimise mineral processing at seven sites in Australia, the US and Mongolia.

However, a report by global mobile satellite company Inmarsat reveals that the IoT is increasingly being employed in the field of environmental monitoring to help resource-heavy mining operators satisfy increasingly stringent environmental regulations and corporate social responsibility policies.

“Improving environmental monitoring is an area where mining operators clearly see real value in IoT,” confirms Joe Carr, director of mining at Inmarsat Enterprise.

“The increasing pressure from strict government regulations focused on mining’s environmental impact is placing a heavy burden on businesses in the sector, so operators must embrace innovative technologies if they are to comply and continue to operate efficiently and sustainably.”

The info-rich future:  IoT and environmental monitoring

Inmarsat’s report, ‘The Future of IoT in Enterprise – 2017’ involved 100 global mining companies. Almost half (47%) identified monitoring environmental changes as their number one priority for IoT deployments; a further 57% cited environmental monitoring as the most exciting IoT innovation.

The report concludes that IoT technologies have the potential to dramatically reduce the impact of mining operations on the environment, enabling mining businesses to monitor their assets more accurately and react more quickly to any potential issues, thus minimising environmental damage.

Such damage is both real and multifarious. Mining processes, particularly the controversial practice of strip mining − which now accounts for around 40% of the world’s coal mines – can result in erosion, sinkholes, loss of biodiversity and, perhaps most commonly, the contamination of soil, groundwater and surface water by chemicals.

Mining operators have a duty of care over a project’s lifetime to ensure the environmental impact is minimised and the land rehabilitated to its natural state. However, relying on manually operated processes that use sub-optimal data collection and analysis can be expensive and prone to error.

Read More Here

Article Credit: Mining Technology

Go to Source