Facial recognition technology

Facial recognition technology

In 2018 we realise that Facebook is now doing facial recognition even on photos you're untagged in.

The myth of the surveillance society is nothing more than a myth. Just because there are security cameras in every street corner, it doesn't mean that it's infallible or that CCTV is delivering a safer society. When it comes to real-life situations, camera-based visual surveillance is not really accurate nor practical because you ultimately you need a human to watch the footage as they cannot rely on technology alone. For instance, during the 2011 London riots, facial recognition software contributed to just one arrest out of the 4,962 that took place. That is why visual surveillance still relies on people watching hours of footage - which is time consuming and unsustainable.

Software advances made in DNA sequence analysis could be a game changer in the field of video analysis software. These software tools and techniques, which treat video as a scene that evolves in the same way DNA does, could revolutionise automated visual surveillance.

While CCTV cameras create endless and complex video footage to analyse, automate video surveillance remains limited to tasks in relatively controlled environments. Although it is easy to detect a trespasser into somebody's property can be complete quite accurately, analysing footage of groups of people or identifying someone in particular in a public space is not as accurate since outdoor scenes vary and change so much.

The way to improve automated video analysis is by devising a software that can deal with this variability rather than treating as an inconvenience. One area that deals with large amounts of very variable data is genomics. The three billion DNA characters of the first human genome (the entire set of genetic data in a human) were sequenced in 2001, and since then, the production of this kind of genomic data has increased at an exponential rate. Given the amount of this data and the degree to which it can vary has led to vast amounts of money and resources being deployed to develop specialised software and computing facilities to handle it.

Thanks to this software, today it's possible for scientists to relatively easily access genome analysis services to study all sorts of things, including how to combat diseases and design personalised medical services, and even uncovering the mysteries of human history.

By investigating the mutations that have taken place over time, genomic analysis studies the evolution of genes. This can be compared to what visual surveillance is up against, which is the challenge of interpreting the evolution of a scene over time to spot and track moving pedestrians.

If we apply the same principles that are used in genomics to video surveillance, treating the images that make up a video as mutations, that we can solve the system's biggest challenge.

This practice is called "vide-omics" and it has already demonstrated its potential. For instance, one research group led by Jean-Christophe Nebel, associate professor in Pattern Recognition, Kingston University, has, for the first time, show that videos could be analysed even when captured by a freely moving camera. "By identifying camera motions as mutations, they can be compensated so that a scene appears as if filmed by a fixed camera," Nebel explained.

At the same time, researchers at the University of Verona have demonstrated that image processing tasks can be encoded such a way that standard genomics tools could be exploited. "This is particularly important since such an approach reduces significantly the cost and time of software development," Nebel said.

"Combining this with our strategy could eventually deliver the visual surveillance revolution that was promised many years ago," he added. "If the ‘vide-omics‘ principle were to be adopted, the coming decade could deliver much smarter cameras. In which case, we had better get used to being spotted on video far more often."

Asian markets

Asian markets

Asia has a longstanding history of lucrative trade routes. In the 21st century, much of the cross-frontier commerce relies on organizations utilizing the power of the internet. But its worth considering how many of Asia's key trade associations were first established, many centuries ago. A lot of these relationships persist to this day.

Innovation and good business ideas travel a great distance – and one of the fundamental drivers of this is travel. There is nothing new in this as a concept – in Asia, the routes that were most responsible for the dissemination of innovative ideas were the so-called silk roads.

The beginning of the Silk Road trade network that extended to the Roman Empire. The main route of the Silk Road traveled through China into Central Asia, Korea, India, Pakistan, Tibet, Uzbekistan, Tajikistan, Kyrgyzstan, Turkmenistan, Afghanistan, Kazakhstan, Persia, Iraq, Turkey, Greece and the shores of the Mediterranean Sea. Together with merchant caravans Buddhist monks went from India to Central Asia and China, preaching their religion. While many different kinds of merchandise traveled along the Silk Road, the name comes from the popularity of Chinese silk with the west, especially with Rome. 1271-1295. Marco Polo. The most famous of the Silk Road travelers, who, by his own account, worked for Qubilai Khan traveled the Silk Road.

Think of one of humankind's most important inventions – of all time. That would be paper. This was first created in China, during the Han dynasty, coinciding with trade becoming increasingly prevalent along the silk road. Paper was considered so revolutionary at the time, because prior to its appearance amongst the caravans plodding along the vast cross-Asian highways, written communication relied on narrow wooden strips, or cumbersome rolls of silk. But thanks to the demand for this new substance that could be satisfied with the convenience of the silk roads, the idea quickly took hold in other parts of Easy Asia.

It took longer for paper to establish itself as the writing platform of choice in the northwest of China. Apart from proving ever more popular in Buddhist temples, the surrounding towns and villages were more content to hang on to the archaic papyrus and parchment methods of writing. But with the ebb and flow of civilizations in that part of the world, the influence of the all-conquering Mongols ensured that papyrus was superseded throughout China. As the world grew increasingly open over the centuries, Chinese ingenuity began arriving in the Middle East, and then making its way to Western Europe.

Another invention that spread across the world in a westwards direction was the use of water wheels for irrigation. Attributed to ancient engineers in the Roman province of Syria, the use of pots attached to a vertical waterwheel, driven by river currents, became relied upon for lifting water from its source. The fact this could be done without the input of human or animal force made it very appealing to all manner of tradespeople.

As well as these innovations, the silk roads winding their way across the vast Asian steppes, across the Caucasian Mountains and eventually into Europe, brought with them a host of exotic foodstuffs. Oranges, grapes, spices and a tremendous range of produce began making its way across the huge distances between nations, with demand rising as products gained new audiences.

The camel caravans that once plied their trade along the silk road have long been superseded by quicker, more efficient mechanized transport. But the essential ingredients of the Asia trade sector remain unchanged. Different cultures can have their diverse demands for items satisfied. Except, with the benefit of today's technological advances, it is possible for a consumer in Europe to order services from someone in China, with a few clicks of a keyboard.

Cyber health checks

Cyber health checks

Given that malware and other forms of internet sabotage have the potential to cost e-Commerce companies a vast amount of money, a timely announcement has come from IT Governance. This cyber security service is launching a specific ‘cyber health check' aimed at providing a sense of reassurance for a cross-section of small to medium-sized organisations.

This check, instigated back in 2014, will not be tailored to the size of the company under the spotlight. Instead the check will be available at a fixed-rate price. Consultancy will be offered on-site, as well as a full audit of respective computer infrastructures. Following-on from the exhaustive data checking, a report into the remote vulnerability assessment will enable managers to get an accurate snapshot of exactly how robust their organisation currently is.

A survey conducted by British Telecommunications last year demonstrated that companies in the United Kingdom were lagging some way behind their American counterparts in several crucial area of IT security. This discrepancy was most marked in respective levels of preparedness for countering threats. This attitude extrapolates to how robust any organisation is likely to be in combating the incredibly diverse range of online threats, whether that be non-malicious insider threats, or direct attacks by hackers. Perhaps the fact that the US continues to shrug off the paralysing effects of the September 11 attacks has implanted a more deep-rooted fear of malicious cyber activity.

The Founder and Executive Chairman of IT Governance, Alan Calder, stated: ‘With the proliferation of cyber attacks, the UK organizations' ability to assess the cyber risks and put relevant controls in place will be increasingly tested. Those who take the right measures, and on time, will be able to withstand an attack and those, who don't, will fail. Identifying the gaps between your targeted risk mitigation position and your current situation is a critical step for developing a business-led cyber security strategy that will ensure your future business resilience'.

If organizations are in any way under-prepared for perceived cyber threats in the current environment, they would be advised to take the appropriate action. The future of the internet, with technology such as Cloud services emerging, means that the number of potential areas to be exploited by hackers is increasing rather than shrinking.

According to security spokespeople, migration to the web, coupled with increasingly sophisticated software, will create ever more vulnerability for e-Commerce. This, in turn, will draw cyber attackers like a magnet. What may well inspire management teams to shrug off their complacency are the results of these cyber health checks. It might come as a surprise to these organizations to find that they are not currently under attack – but their defenses were breached many months ago.

10 ways BT Virus Protect helps keep your computer safe

1. VirusScan

VirusScan runs in the background of your computer, continually monitoring in-real time for viruses, Trojans, tracking cookies, adware, spyware, unwanted programs and threats from email or instant messaging.

If it identifies a threat, it deals with it before it can do any damage, or lets you know if you need to take further action.

2. SiteAdvisor

Some websites include spyware, spam and online scams. SiteAdvisor checks for threatening websites and warns you before you interact with them.

3. Personal Firewall

Virus Protect has a built in-firewall which protects your network, acting as a virtual gateway for incoming traffic, letting in safe traffic and blocking incoming threats including hackers.

4. Parental controls

Protect your children from online dangers with Virus Protect's Parental Controls. Turn on age-appropriate searches, set web browsing limits and filter inappropriate websites. You can also chose to restrict access to specific websites and block access based on keywords.

5. Clean-up tools

Keep your home PC running at optimum performance with Virus Protect's health tools, including automated file, browser and browser history clean-up and disc defragmentation.

6. Spyware protection

Spyware is software that gets information from your computer without your knowledge and can make changes to your computer, slowing it down in the process. Virus Plus protects, detects and removes spyware and adware, as well as blocking tracking cookies.

7. Stealth mode

This mode allows you to use the internet anonymously, so your machine can't be seen by hackers.

8. Vulnerability Scanner

Companies like Microsoft, Google and Adobe continually releases software updates for their software often containing crucial security updates, so it's important to keep your machine up to date. Vulnerability Scanner installs the latest Windows updates, and those from other programs.

9. McAfee SystemGuards

McAfee SystemGuards monitor your computer for tell-tale signals of viruses, spyware and hacking activity.

10. McAfee Security Centre

Use this to review your computer's security status, check for updates and fix security issues.

 How to get Virus Protect:

1. Visit My BT and log in or sign up

2. Scroll down to My Extras, look for the BT Virus Protect panel and click Get Started.

3. Follow instructions to activate Virus Protect and begin the download.

4. Download and install it, look for the McAfee icon in your system tray, which means you are protected.

McAfee are one of many well-known security companies that produce apps for anti-virus/malware. We suggest it might be a good idea to have a few different security apps available from companies including Trend micro, Avast, Kaspersky.

Deep sea exploration news

Deep sea exploration news

When it comes to boldly going where no man has gone before, to paraphrase the somewhat sexist statement from television's Star Trek series, one thing is for sure. The deepest points in the ocean of our planet are far more mysterious and impenetrable than some of the locations in outer space. This is a fact – we know more about what the surface of the planet Mars looks like than we do what lies at the foot of the Pacific Ocean.

Uncovering the foreboding undersea world has captivated the imagination of humankind for centuries. The difference is that technology has advanced to a stage that we can now send vessels to depths that were unimaginable until fairly recently. The deepest portion of the ocean is the Challenger Deep, lying at the base of the Mariana Trench. This is a mind-boggling 11 kilometers beneath the surface. In March 2012, the movie director James Cameron (perhaps most widely known for his blockbuster Titanic) entered a self-designed submersible, called the Deepsea Challenger. This was kitted out for exploration and research, allowing Cameron to take samples as well as thoroughly documenting his dive in high-resolution 3D film.

Cameron's CV might well be headed ‘movie director', but he is the veteran of 72 submersible operations to date. 51 of these were accomplished in the Russian craft Mir. The latter vessels were used for dives to 4,900 meters during his research for the Titanic. In his most recent exploration, to the uncharted depths of the Challenger Deep, his craft was a claustrophobic vessel made primarily of specialized glass foam. This material had to be robust enough to withstand the tremendous pressures at that depth. As Cameron slipped through the waters, he sampled material for scientific research, as well as making a feature-length documentary.

This was a particularly tricky assignment because sunlight does not penetrate to these depths, and the pressure exerted by the sheer weight of water is equivalent to a thousand times what is experienced above the surface. Nevertheless, the research vessel filmed previously unseen aquatic life-forms, as well as scooping up samples of rocks, minerals and animals. As well as being of vital importance to natural historians, the rock samples help geologists to understand the forces that cause earthquakes and tsunamis. The dive also provided answers to questions about the very origins of life on earth.