POPULARITY
On this latest episode of UNBiased I'm joined by Sudhir Tiku. Sudhir is a Technical philosopher,Automation expert and a Certified Futurist, based out of Singapore, where he also works as Vice President for Asia Pacific and China at Bosch Singapore. Sudhir is member of IEEE (Institute of Electrical and Electronics Engineers) and also a badge holder of AI Ethics from London School of Economics. He is a regular at TEDx circles in Asia Pacific on topics of AI and its impact on humanity. He is also a blogger, author and a climber.Sudhir is the first technologist that I had encountered personally who showed the same depth of knowledge, care and understanding for the nuances around AI that extended beyond what the technology can actually do to history, ethics, law, culture and more. Through his optimistic and intersectional lens, Sudhir tempered my impatience with the ability for society and regulation to keep up with change with some reminders on where we currently are in the life cycle of this new revolution. We explore AI's evolution to date – how it's moved from infancy toward a more complex, nuanced understanding of the world through generative and agentic AI. From historically skewed image datasets that underrepresented entire populations to the growing push for fairness in AI, progress is happening. This conversation is for anyone who cares about the future of technology, equity, and the responsibility we all share in shaping AI for good.
This episode focuses on healthcare cybersecurity and a new set of standards established by the IEEE (Institute of Electrical and Electronics Engineers). MedCity News Assistant Editor Katie Adams interviewed Florence Hudson, who serves as chair of the IEEE working group that created this new framework. The pair discussed the new framework, as well as talked about the state of healthcare cybersecurity and explored what resource-strapped organizations can do to comply with new cybersecurity protocols. Episode Resources Connect with Arundhati Parmar aparmar@medcitynews.com https://twitter.com/aparmarbb?lang=en https://medcitynews.com/ Connect with Florence Hudson https://www.linkedin.com/in/florencehudson/ Review, Subscribe and Share If you like what you hear please leave a review by clicking here Make sure you're subscribed to the podcast so you get the latest episodes. Click here to subscribe with Apple Podcasts Click here to subscribe with Spotify Click here to subscribe with Podbean Click here to subscribe with RSS
(2:00) Which Democrats Do You Support for President? Or the Marxist?Democrat RFKj will join with NY Democrat Trump.Can they be trusted on the issues or anything else?How is it likely to change things? Will RFKj voters support Trump, Lala, or neither?(00:34:24) Does Ivermectin cause Infertility? Examining NANOTECH in Trump's mRNAIvermectin has been touted as helpful against respiratory illness and cancer. But there have also been concerns about it causing infertility. Here's a look at the study…The Japanese govt destroyed millions of vials of mRNA Trump shots after they were found to have black precipitates that interacted with magnets. Now a more detailed look at the Japanese study that appears to have found self-assembling nanotechThe Internet of Bio-Nanotech — a paper from IEEE (Institute of Electrical & Electronic Engineers) in 2015 said "tiny, concealable, and non-intrusive Things are needed."Control UnitMemory UnitProcessing UnitPower UnitTransceiversSensing & actuation(1:13:32) Acknowledging our donors (1:16:15) Walz skeedattled out of National Guard & inflated his rank but a Christian officer is kicked out of Idaho National Guard based on a subordinate's hurt feelings about his beliefs on social media. Will Republican Gov Brad "Lockdown" Little do the right thing? (1:24:42) Tim Allen says he's reading the Bible for the first time and finds it "amazing". Previously he referred to "The Builder", his acknowledgement of Intelligent Design.John Lennox, mathematician and Christian philosopher, on "My Last Words to the World"(1:36:26) INTERVIEW Real Money vs Fake Jobs, Fake Economy Every quarter govt lies about jobs, revising previous quarter down and inflating the current quarter. But this time was nearly a record. This revision will be used to justify lower interest rates a little for dragflation. But what happens next in the US? The global financial system is changing at a whirlwind pace. Tony Arterburn, DavidKnight.gold joins (2:18:06) Escalation of Ukraine War as Russia is invadedThe London Times says UK trained troops for Kursk Russian invasionRussia says the obvious about US foreknowledgeWhat was the motivation for WSJ planted story about lone wolf amateurs blowing up NordstreamBiden says Kissinger called him before he died and said Europe is no longer afraid of Russia. So why is Germany cutting off funds to Ukraine? Why did those at the DNC applaud Biden's deranged boasting of war?(2:49:45) How did maggots get into DNC — food? FBI called on to investigateEat Ze Bugs? They demanded meatless proteinStatue Wars. As statues of American historical figures and those who shaped our country and culture are being torn down everywhere, a Houston Hindu temple erects the 3rd largest statue in USA — of the Hindu Monkey God. And on the University of Houston campus the controversial pagan statue celebrating abortion is — BEHEADEDFind out more about the show and where you can watch it at TheDavidKnightShow.comIf you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Money should have intrinsic value AND transactional privacy: Go to DavidKnight.gold for great deals on physical gold/silverFor 10% off Gerald Celente's prescient Trends Journal, go to TrendsJournal.com and enter the code KNIGHTBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-david-knight-show--2653468/support.
(2:00) Which Democrats Do You Support for President? Or the Marxist?Democrat RFKj will join with NY Democrat Trump.Can they be trusted on the issues or anything else?How is it likely to change things? Will RFKj voters support Trump, Lala, or neither?(00:34:24) Does Ivermectin cause Infertility? Examining NANOTECH in Trump's mRNAIvermectin has been touted as helpful against respiratory illness and cancer. But there have also been concerns about it causing infertility. Here's a look at the study…The Japanese govt destroyed millions of vials of mRNA Trump shots after they were found to have black precipitates that interacted with magnets. Now a more detailed look at the Japanese study that appears to have found self-assembling nanotechThe Internet of Bio-Nanotech — a paper from IEEE (Institute of Electrical & Electronic Engineers) in 2015 said "tiny, concealable, and non-intrusive Things are needed."Control UnitMemory UnitProcessing UnitPower UnitTransceiversSensing & actuation(1:13:32) Acknowledging our donors (1:16:15) Walz skeedattled out of National Guard & inflated his rank but a Christian officer is kicked out of Idaho National Guard based on a subordinate's hurt feelings about his beliefs on social media. Will Republican Gov Brad "Lockdown" Little do the right thing? (1:24:42) Tim Allen says he's reading the Bible for the first time and finds it "amazing". Previously he referred to "The Builder", his acknowledgement of Intelligent Design.John Lennox, mathematician and Christian philosopher, on "My Last Words to the World"(1:36:26) INTERVIEW Real Money vs Fake Jobs, Fake Economy Every quarter govt lies about jobs, revising previous quarter down and inflating the current quarter. But this time was nearly a record. This revision will be used to justify lower interest rates a little for dragflation. But what happens next in the US? The global financial system is changing at a whirlwind pace. Tony Arterburn, DavidKnight.gold joins (2:18:06) Escalation of Ukraine War as Russia is invadedThe London Times says UK trained troops for Kursk Russian invasionRussia says the obvious about US foreknowledgeWhat was the motivation for WSJ planted story about lone wolf amateurs blowing up NordstreamBiden says Kissinger called him before he died and said Europe is no longer afraid of Russia. So why is Germany cutting off funds to Ukraine? Why did those at the DNC applaud Biden's deranged boasting of war?(2:49:45) How did maggots get into DNC — food? FBI called on to investigateEat Ze Bugs? They demanded meatless proteinStatue Wars. As statues of American historical figures and those who shaped our country and culture are being torn down everywhere, a Houston Hindu temple erects the 3rd largest statue in USA — of the Hindu Monkey God. And on the University of Houston campus the controversial pagan statue celebrating abortion is — BEHEADEDFind out more about the show and where you can watch it at TheDavidKnightShow.comIf you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Money should have intrinsic value AND transactional privacy: Go to DavidKnight.gold for great deals on physical gold/silverFor 10% off Gerald Celente's prescient Trends Journal, go to TrendsJournal.com and enter the code KNIGHTBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-real-david-knight-show--5282736/support.
Meet Joanne Wong, a seasoned leader with a rich background in technology, engineering, and entrepreneurship. As a key figure in the Institute of Electrical and Electronics Engineers (IEEE) and the Chair of its Entrepreneurship program, she is actively shaping the future of tech startups globally. Join us as we delve into Joanne's insights on addressing challenges, fostering collaboration, and driving hard tech initiatives for a sustainable and tech-forward world. [00:10] - About Joanne Wong Joanne is the General Partner at REDDS Capital, a VC firm investing in global early-stage IT startups. She is the Chair of IEEE (Institute of Electrical and Electronics Engineers). She has worked with IBM, HP, SAP, and Cisco in multiple technical and strategic investment positions. --- Support this podcast: https://podcasters.spotify.com/pod/show/tbcy/support
Did David Long not send us into the weekend the right way or what?! What was your biggest takeaway from our conversation with him? If you haven't already connected with David, you are missing out on knowledge left and right!Connect with and Follow David Long: https://qrco.de/bd5FE2Watch Show David Long: https://lnkd.in/gFAXtFwrIt is Graduation Season. Chris's niece Abbie graduated over the weekend with her Masters. Incredible accomplishment with two adorable little boys and ever supporting husband Kris. The President of the college brought up a simple yet very wise statement in addressing the recent graduates. Commencement means to start, to begin and how this was the beginning of a brand new chapter for them.As Brian Pasch leads us into the uncharted GA4 Front, we are commencing into brand new territory. I for one am ever grateful to have him as our fearless leader. Look at this list of names! It is incredible to see the companies answering the call! Brian Kramer equated this council to "Bluetooth having a IEEE (Institute of Electrical and Electronics Engineers) or SIG Standards for Modern Retail KPIs." GA4 Council Assemble!Today is a packed today! I may need an extra bowl of Wheaties and...mug of tea!Join me today on Jeff Polo and Ian Nethercott's Auto Hub Show "The Inclusive Marketing Show" this Monday at 10 AM CST: https://bit.ly/3myVppcJoin me on Ted Ings After Dark at the Fixed Ops Roundtable® at 7 PM CST: https://bit.ly/3xFiVpVConnect with BZ Consultants Group: https://qrco.de/bcqqFoFollow, subscribe, and never miss a show!#BZConsultantsGroup #BZConsultants #FactsNotFeelings #FactsNotFeelingsFriday #Love #Unite #Support #UniteInLove #Carllage #DavidLong #Hansel #HanselAutoGroup #Commencement #Graduation #GA4 #Google #GoogleAnalytics #GoogleAnalytics4 #InspireOthers #Positivity #PandemicOfPositivity #Patience #BeKind #PersonalDevelopment #FixedOps #Service #TedIngs #FixedOpsRoundTable #AFTERDARKatTheFixedOpsRoundtable #AutoHubShow #AutoHub #CustomerExperience #Consultant #BrookeFurniss #Podcast #automotive #CarConsultant #AutomotiveConsultant #CartTalk #CarDealership #WomenInAutomotive #WomenInBusiness #AutomotiveMarketing #PrideMonth #LoveIsLove
The machines that make the biggest difference are the ones that make things move and bring people together. This week, our postcards take us to critical moments in the history of technology: the completion of the Erie Canal from the Hudson River to Lake Erie across northern New York state, and the development of the first civilian computers just after the Second World War. In both stories there is a surprising amount at stake for music history.Just clearing a path for and then digging the Erie Canal (mile by mile, by hand) required an immense and dangerous effort. There were not enough workers available, so migrants, many from Britain and Ireland, but also free and enslaved people of color, were brought in to do the job. When the work was done the canal accelerated travel and communication, connecting the metropolis of New York to an immense hinterland to the west. The canal gave the new nation a vastly different sense of its borders and identity. Those who had given their labor (and in some cases their lives) to make it forged soundworlds for this new space. In the evenings and on rare days off they sang and danced together, making new kinds of music. What they did–a kind of synthesis travelling back and forth on the wonder they had built--would go on to underpin what we recognize as “American music” today. After 1945 Alan Turing, who had spent the war working in secret developing the electronic computers that helped break “unbreakable” German codes, helped set up a civilian computer lab at the University of Manchester. Turing was by all accounts not a particularly musical man, but there were good ears on his team. One night, for fun (!), one of Turing's junior colleagues, Christopher Strachey, used an alarm signal already built into a prototype computer to make a basic synthesizer, with hilarious-sounding but in the long run profound results. Thanks to recently discovered archival recordings we can hear its honky efforts, and the sleep-deprived giggles of Turing's young colleagues when they heard what they had done. The members of Turing's lab might not have known it, but what they did eventually opened up a wholly new chapter in the datafication of music. Like the workers on the Erie Canal two centuries ago, we suddenly find that our musical borders have shifted dramatically. Unlike them we ask ourselves where music “is” if it now only lives in digital code.Key PointsThe construction of the Erie canal brought labor and technology together to make new kinds of music, and the connections it made forged a new sense of American identity, also in sound.Alan Turing was involved in efforts to develop the first civilian computers in Britain after World War Two. Although they didn't set out to do so, members of his team found that they could synthesize musical sound, inadvertently setting the stage for the cultures of digital music we now live in.ResourcesChris Smith's The Creolization of American Culture: William Sydney Mount and the Roots of Blackface Minstrelsy explores how working people came together before the Civil War to make a new kind of “American” culture.In Decomposed: The Political Ecology of Music Kyle Devine explores the idea that digital music is just as material music on other media (such as shellac, vinyl, and plastic), and just as bad for the environment.The IEEE (Institute of Electronic and Electronics Engineers) website has a detailed and engaging description of early computing and music-making in Alan Turing's postwar Manchester lab.You can read more about Alan Turing in B. Jack Copeland, Alan Turing: Pioneer of the Information Age.All of the books mentioned in the episode can be found in our Sounding History Goodreads discussion group. Join the conversation!
Produced by: Catherine Charlwood (@DrCharlwood) and Laura Ludtke (@lady_electric) Music composed and performed by Gareth Jones. About the episode: This sixth episode of the third series of LitSciPod features an interview with Dr Heather Love, Assistant Professor of English Literature at the University of Waterloo (Canada). Heather discusses her work on cybernetics in the works of Ezra Pound, John Dos Passos, and Virginia Woolf, as well as modernism and diagnosis. She introduces us to her new project on obstetrics and explores her unique relationship with the IEEE (Institute of Electrical and Electronics Engineers). Together, we consider the importance of the concept of the cluster to her research. At the end of the episode, you can hear Heather read an excerpt from Gertrude Stein's Everybody's Autobiography (1937). Episode resources (in order of appearance): • Gabriel Roberts, “ The Humanities in Modern Britain: Challenges and Opportunities”, Higher Education Policy Institute (2021) • Lord Browne, “Securing a sustainable future for higher education: an independent review of higher education funding and student finance” (2010) • Royal Society, “Jobs are changing, so should education” (2019) • Heather Love, “The Cluster as Interpretive Gesture” in “Traces”, Open Thresholds (2017): http://openthresholds.org/2/clusterasinterpretivegesture. • Love, “Newsreels, Novels, and Cybernetics: Reading the Random Patterns of John Dos Passos's U.S.A.”, Journal of Modern Literature • Janet Galligani Casey, Dos Passos and the Ideology of the Feminine (1998) • Walter Pater, The Renaissance • William James, The Principles of Psychology • Ross Ashby, “The Black Box”, An Introduction to Cybernetics (1956). • Sylvan Thompkins, Affect Imagery Consciousness: The Positive Affects (1962) • Virginia Woolf, The Waves (1931) •Dorothy Richardson, Pilgrimage (1915–38) • Paul Jaussen, Writing in Real Time: Emergent Poetics from Whitman to the Digital (2017) • John Dos Passos, USA Trilogy (1930–6); Manhattan Transfer (1925) • Love, “Cybernetic Modernism and the Feedback Loop: Ezra Pound's Poetics of Transmission”, Modernism/modernity (2016) • Joy Division, “Transmission”, Novelty (1979) •Ezra Pound, Cantos LII–LXXI (1940) • Woolf, “Character in Fiction” The Criterion (1924) • Ford Madox Ford, “On Impressionism,” Poetry and Drama (1913) • Rudolf Arnheim, Rundfunk als hörkunst (1933), translated as Radio as Sound (1936) • University of Waterloo, Co-op Program (https://uwaterloo.ca/future-students/co-op); Master of Arts in Experimental Digital Media (https://uwaterloo.ca/english/xdm) • Siegfried Zielinski, [. . . After the Media]: News from the Slow-Fading Twentieth Century (2013) • Love & Lisa Mendelman, Modernism and Diagnosis in Modernism/modernity Print Plus 6.2 (2021): https://doi.org/10.26597/mod.0198 • Kevin Jackson, Constellation of Genius: 1922: Modernism Year One (2012) • Paul Stephens, The Poetics of Information Overload: From Gertrude Stein to Conceptual Writing (2015) Stephens, “Stars in My Pocket Like Bits of Data: The poetics of information overload”, Guernica (15 July 2015) • Robertson Collection, Museum of Healthcare at Kingston. See https://www.atlasobscura.com/articles/objects-of-intrigue-museum-of-health-care-moulages
Episode 10: A Hero and Pioneer: The Inspiring Story of Gunther Karger Today, we are honored to interview the esteemed Gunther Karger. Mr. Karger's story is both amazing and diverse, starting with his birth and early years in Germany, where he narrowly escaped death on the last children's transport out of Germany to Sweden. Shortly after his departure, his parents and grandparents were murdered by the Nazis. After WWII, and moving from several foster homes and orphanages, young Karger was sent to the U.S. where he later joined the Air Force, becoming an instructor in aircraft radars. He earned a degree in electrical engineering at LSU and quickly advanced in the aerospace industry working in the missile and space program. Mr. Karger was one of three engineers which developed the world's first communication satellite, and he served in a national security role reporting to the White House and Secretary of Defense during the Cold War. From there, Karger pioneered V/STOL aircraft for the commercial aviation industry and developed a computer model for forecasting revenue for Eastern Airlines, which he managed for 15 years. Gunther is a Life Senior Member of the IEEE (Institute of Electrical and electronics engineers) and served as its Canaveral Chapter President during the Apollo program. He also is a Fellow of the British Interplanetary Society citing contributions during the early period of America's space program. During the Cold War, Gunther s named “Outstanding Young Man of America” for his contributions to National Security. Currently, he serves on the Board of directors of Missile, Space, and Range Pioneers manages a hedge fund that specializes in the aero industry and has authored books on his time on Wall Street. And now, here's Kevin along with Gunther and his wife, Shirley, to share a little more about his fascinating life. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/shawna-christenson2/support
In the September to October 2020 edition of IEEE (Institute for Electricians and Engineers) Potentials, Raymond E. Floyd wrote Industry or academia. Listen to my response. Image by Steve Buissinne from Pixabay --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app Support this podcast: https://anchor.fm/bitjetkit/support
Episode 82 - John C. Havens on Autonomous System/AI Ethics This week, Carla Diana is away, and Tom Guarriello speaks with John C. Havens about his work with the IEEE (Institute of Electrical and Electronics Engineers) Standards Association, a project to create standards for “measuring the impact of artificial intelligence or autonomous and intelligent systems (A/IS) on humans.” Show Notes Heartificial Intelligence - John's book IEEE Ethics in Action Website IEEE Well-Being chapter Ciitizen health data repository Gliimpse acquisition Google ethics council disbanded The RoboPsych Podcast has been voted one of the Top 5 Robotics Podcasts by Feedspot readers. Thanks for listening to the RoboPsych Podcast. Please subscribe and review! Subscribe in iTunes Subscribe on Overcast RoboPsych.com
Rebroadcast from the original Oct. 30 talk.WEST LAFAYETTE, Ind. — Mikhail Atallah, distinguished professor of computer science and a professor of electrical and computer engineering (courtesy), has been chosen as the 2017 Arden L. Bement Jr. Award recipient. One of Purdue University's top three research honors, the Bement Award is the most prestigious award the university bestows in pure and applied science and engineering.Atallah is being honored for his significant contributions in the design and implementation of efficient processing and security protections for computer-based technologies."Dr. Atallah's world-renowned work in algorithms, access hierarchies and information security combines deep theoretical approaches with solutions-based efficient designs to address the most challenging computer processing and security issues," said Suresh Garimella, Purdue's executive vice president for research and partnerships and the Goodson Distinguished Professor of Mechanical Engineering, in announcing the winner. "His highly creative and innovative ideas and fresh viewpoints have had a major impact on the fields of distributed computing and cyber security."Atallah will deliver the Arden L. Bement Jr. Distinguished Lecture on Oct. 30 in Stewart Center's Fowler Hall. The 1:30 p.m. lecture is free and open to the public.Among his accomplishments, Atallah settled longstanding open problems in data structuring for range-minimum queries and in data filtering with running-max filters. He designed an influential and award-winning technique for key management in access hierarchies and developed a divide-and-conquer technique to parallelize sequential algorithms, resulting in numerous optimal algorithms for solving complex geometric and combinatorial problems.Atallah co-founded Arxan Technologies Inc., to commercialize a software protection technology developed jointly with his doctoral student Hoi Chang. Used in more than 500 million computing devices today, the technology consists of injecting self-protective mechanisms in software that make it harder to hack. Atallah came to Purdue as an assistant professor of computer science in 1982 after earning a doctorate at Johns Hopkins University. He was named a full professor in 1989 and has been a distinguished professor since 2004. He is affiliated with the Center for Education and Research in Information Assurance and Security (CERIAS) and has a courtesy appointment in the School of Electrical and Computer Engineering.He is a fellow of both the Association for Computing Machinery and IEEE (Institute of Electrical and Electronics Engineers). His work on key management received the 2015 CCS Test of Time Award. He was the 2016 recipient of the Purdue Sigma Xi Faculty Research Award, and the 2013 recipient of the Purdue Outstanding Commercialization Award. He has lectured frequently around the nation and the world as a keynote and invited speaker and has served on editorial boards of top journals and on program committees of top conferences and workshops.The Arden L. Bement Jr. Award was established in 2015 by Purdue professor emeritus Arden Bement and his wife, Mrs. Louise Bement. The Bement Award recognizes Purdue faculty for outstanding and widely recognized contributions in the areas of pure and applied science and engineering.Winners of the Bement Award are nominated by colleagues, recommended by a faculty committee and named by the university president. Recipients receive a cash award and a small support grant for their university scholarly activities.
Rebroadcast from the original Oct. 30 talk.WEST LAFAYETTE, Ind. — Mikhail Atallah, distinguished professor of computer science and a professor of electrical and computer engineering (courtesy), has been chosen as the 2017 Arden L. Bement Jr. Award recipient. One of Purdue University's top three research honors, the Bement Award is the most prestigious award the university bestows in pure and applied science and engineering. Atallah is being honored for his significant contributions in the design and implementation of efficient processing and security protections for computer-based technologies. “Dr. Atallah’s world-renowned work in algorithms, access hierarchies and information security combines deep theoretical approaches with solutions-based efficient designs to address the most challenging computer processing and security issues,” said Suresh Garimella, Purdue's executive vice president for research and partnerships and the Goodson Distinguished Professor of Mechanical Engineering, in announcing the winner. “His highly creative and innovative ideas and fresh viewpoints have had a major impact on the fields of distributed computing and cyber security.” Atallah will deliver the Arden L. Bement Jr. Distinguished Lecture on Oct. 30 in Stewart Center's Fowler Hall. The 1:30 p.m. lecture is free and open to the public. Among his accomplishments, Atallah settled longstanding open problems in data structuring for range-minimum queries and in data filtering with running-max filters. He designed an influential and award-winning technique for key management in access hierarchies and developed a divide-and-conquer technique to parallelize sequential algorithms, resulting in numerous optimal algorithms for solving complex geometric and combinatorial problems. Atallah co-founded Arxan Technologies Inc., to commercialize a software protection technology developed jointly with his doctoral student Hoi Chang. Used in more than 500 million computing devices today, the technology consists of injecting self-protective mechanisms in software that make it harder to hack. Atallah came to Purdue as an assistant professor of computer science in 1982 after earning a doctorate at Johns Hopkins University. He was named a full professor in 1989 and has been a distinguished professor since 2004. He is affiliated with the Center for Education and Research in Information Assurance and Security (CERIAS) and has a courtesy appointment in the School of Electrical and Computer Engineering. He is a fellow of both the Association for Computing Machinery and IEEE (Institute of Electrical and Electronics Engineers). His work on key management received the 2015 CCS Test of Time Award. He was the 2016 recipient of the Purdue Sigma Xi Faculty Research Award, and the 2013 recipient of the Purdue Outstanding Commercialization Award. He has lectured frequently around the nation and the world as a keynote and invited speaker and has served on editorial boards of top journals and on program committees of top conferences and workshops. The Arden L. Bement Jr. Award was established in 2015 by Purdue professor emeritus Arden Bement and his wife, Mrs. Louise Bement. The Bement Award recognizes Purdue faculty for outstanding and widely recognized contributions in the areas of pure and applied science and engineering. Winners of the Bement Award are nominated by colleagues, recommended by a faculty committee and named by the university president. Recipients receive a cash award and a small support grant for their university scholarly activities.
Walter O'Brien (hacker handle: "Scorpion") was a high IQ child prodigy who started programming computers at age nine. Walter founded "Scorpion" when he was 13 years old as he recognized that he could bring together other smart talented engineers from around the world and using a little E.Q. (Emotional Intelligence) and a scientific project management approach they could solve not only technical problems but life problems. O'Brien is a frequent public speaker for IEEE (Institute of Electrical and Electronics Engineers) and teaches as a mentor with the Founder Institute, the world's largest idea-stage incubator. O'Brien has worked with the world's largest mutual fund company, Fujitsu, Microsoft-Trados, Oracle Corporation, Baltimore Technologies, and Critical Path. Walter serves as chairman or board member for Houston Technology Center, Strike Force Solutions, Talentorum Alliance, Lawloop and previously has served on the boards of American Environmental Energy, Starglobe and Toin Corp. In addition, O'Brien is frequently called on by news media, the government, and the federal court system for his technology expertise.
Walter O'Brien (hacker handle: "Scorpion") was a high IQ child prodigy who started programming computers at age nine. Walter founded "Scorpion" when he was 13 years old as he recognized that he could bring together other smart talented engineers from around the world and using a little E.Q. (Emotional Intelligence) and a scientific project management approach they could solve not only technical problems but life problems. O'Brien is a frequent public speaker for IEEE (Institute of Electrical and Electronics Engineers) and teaches as a mentor with the Founder Institute, the world's largest idea-stage incubator. O'Brien has worked with the world's largest mutual fund company, Fujitsu, Microsoft-Trados, Oracle Corporation, Baltimore Technologies, and Critical Path. Walter serves as chairman or board member for Houston Technology Center, Strike Force Solutions, Talentorum Alliance, Lawloop and previously has served on the boards of American Environmental Energy, Starglobe and Toin Corp. In addition, O'Brien is frequently called on by news media, the government, and the federal court system for his technology expertise.
Walter O'Brien (hacker handle: "Scorpion") was a high IQ child prodigy who started programming computers at age nine. Walter founded "Scorpion" when he was 13 years old as he recognized that he could bring together other smart talented engineers from around the world and using a little E.Q. (Emotional Intelligence) and a scientific project management approach they could solve not only technical problems but life problems. O'Brien is a frequent public speaker for IEEE (Institute of Electrical and Electronics Engineers) and teaches as a mentor with the Founder Institute, the world's largest idea-stage incubator. O'Brien has worked with the world's largest mutual fund company, Fujitsu, Microsoft-Trados, Oracle Corporation, Baltimore Technologies, and Critical Path. Walter serves as chairman or board member for Houston Technology Center, Strike Force Solutions, Talentorum Alliance, Lawloop and previously has served on the boards of American Environmental Energy, Starglobe and Toin Corp. In addition, O'Brien is frequently called on by news media, the government, and the federal court system for his technology expertise.
Artık farklı ve yeni bir dünyaya doğru ilerliyoruz- içerisinde hepimizin kablolu ve kablosuz olmak suretiyle bir şekilde bağlantı kurduğumuz bir dünya. Ve her geçen gün daha fazla insan mikrodalga fırın kullandıklarında kablosuz internetlerinin bozulduğuna şahit oluyor. WiFi kablosuz olarak internete giriş yapmamızı sağlayan bir araçtır. Keşfedildiği 1991 yılında, kasada ödeme sistemleri için kullanılmaktaydı. O dönemde ismi ‘WaveLAN’ olarak bilinmekteydi. Kelimenin ‘wave’ kısmı (ing. dalga), bilginin radyo dalgaları ile taşınmasına işaret ederken, ’LAN’ kısmı ise ‘local area network’, yani yerel alan ağı anlamını taşıyor. Bu sistemden sorumlu olan kurum IEEE (Institute of Electrical and Electronics Engineers), yani Elektrik ve Elektronik Mühendisleri Enstitüsü önce bu tanımı değiştirerek sistemin 'IEEE 802.11b Direct Sequence' olarak tanınmasını sağlamıştır. Ancak IEEE söylenmesi çok kolay olmayan bu ifade için, Interbrand Şirketi ile işbirliği yaparak 1999 yılının Ağustos ayında yeni bir karşılık buldu; ‘WİFİ’. Bu isme ‘HiFi’ yani müzik meraklıları için yüksek ses kalitesi anlamına gelen kelimeden yola çıkarak vardılar. Kaynak: Kerry J (Compfight tarafından sağlandı) Benim Wifi ile ilk tanışmam 2000 yılında olmuştu ve o an tamamen büyülenmiştim diyebilirim (hala da öyle). ‘WiFi’ veya ‘bağlantı noktası‘ olarak bildiğimiz şey aslında sadece küçük, amansız bir radyo alıcısıdır; amansızdır çünkü 1 watt‘ın onda biri büyüklüğünde maksimum güce sahiptir. Bir radyo sinyalini yaklaşık olarak 2.45 gigahertz frekansıyla yaymaktadır. Radyo sinyali, 2.45 gigahertz sinyal taşıyıcı ile internet verisini bilgisayarınıza aktarır, ve bir anda kendinizi kablosuz bağlantı ile internette sörf yaparken bulursunuz. Tabii ki, bu süreç anlattığımdan biraz daha karmaşıktır. Birincisi, 2.45 gigahertz frekansının çevresinde yaklaşık bir düzine farklı ve sıralı (ve şaşırtıcı bir şekilde üstüste geçmiş) frekans daha bulunmaktadır. Bu demek oluyor ki, bir grup bilgisayar ve WiFi’a bağlı cihaz aynı anda birbirlerini (çok da) etkilemeden internet üzerinde sörf yapabilir. İkinci olarak ise, bazı WiFi cihazları (ve bilgisayarlar) bu yoğunluktan kaçmak için, birbirleriyle ,yaklaşık 5 gigahertz değerinde olan farklı bir frekanstan iletişim kurabiliyor. Bu frekanslar mikrodalga fırının yaydığı sinyallerden etkilenmiyor. Ancak diğer bir yandan bu cihazların frekans genişlikleri diğerlerine göre daha dar. Mikrodalga fırının sinyallerinin neden WiFi sinyalleri ile çakıştığı konusuna geri dönersek; mikrodalga fırınlar bir yiyeceği ısıtma işlemi için yaklaşık 1.000 Wattlık güç sarf etmektedir. Bu değer nerdeyse bir kablosuz internet erişim cihazının harcadığından 10.000 kat daha fazladır. Bu gücün büyük bir kısmı mikrodalga fırının içerisinde güvenli bir şekilde saklanmaktadır. Ama, internet bağlantınızın bu sistemle çakışması için ise sadece bu gücün ufak bir kısmının sızması yeterli olacaktır. Mikrodalga fırından dışarıya sızan bu azıcık güç insanlara zarar vermese bile internet bağlantınızı altüst edebilir. Sonuç olarak ulaşmak istediğiniz web sayfalarının yüklenme hızı azalır veya bağlantınız kopma noktasına gelir. Teknik bir yazar olan Jim Gier, çalışmakta olan bir mikrodalga fırın ile kablosuz ağ bağlantısının çakışma durumunu belli uzaklıklardan test etti. Çalışır haldeki mikrodalga fırının, kendisine 30 cm uzaklıktaki bir bağlantı cihazının aktarım gücünü %90 oranında düşürebildiği ortaya çıktı. Bu oran 2-3 metrede %75 ve 6 metre uzaklıkta ise % 60 ‘a kadar düşüyor. Bağlantı kuran cihaz sayısı arttıkça durum daha da kötüleşiyor. Yeri gelmişken 2.45 gigahertz frekans bandında olan ve kablosuz ağ ile çakışan bunun gibi birçok farklı cihazın olduğunu da bilmeniz gerekir. Telsiz telefonlar, uzaktan kumanda edilen kapı açma sistemleri, Bluetooth cihazları, bazı taşıt alarm sistemlerinde kullanılan hareket sensörleri, video görüntülerini bir noktadan diğerine gönderen cihazlar (odalardaki,
Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques. Data mining has many ap-plications in security including for national security as well as for cyber security. The threats to national security include attacking buildings, destroying critical infrastructures such as power grids and telecom-munication systems. Data mining techniques are being investigated to find out who the suspicious people are and who is capable of carrying out terrorist activities. Cyber security is involved with protecting the computer and network systems against corruption due to Trojan horses, worms and viruses. Data mining is also being applied to provide solutions such as intrusion detection and auditing. The first part of the presentation will discuss my joint research with Prof. Latifur Khan and our students at the University of Texas at Dallas on data mining for cyber security applications For example; anomaly detection techniques could be used to detect unusual patterns and behaviors. Link analysis may be used to trace the viruses to the perpetrators. Classification may be used to group various cyber attacks and then use the profiles to detect an attack when it occurs. Prediction may be used to determine potential future attacks depending in a way on information learnt about terrorists through email and phone conversations. Data mining is also being applied for intrusion detection and auditing. Other applications include data mining for malicious code detection such as worm detection and managing firewall policies.This second part of the presentation will discuss the various types of threats to national security and de-scribe data mining techniques for handling such threats. Threats include non real-time threats and real-time threats. We need to understand the types of threats and also gather good data to carry out mining and obtain useful results. The challenge is to reduce false positives and false negatives. The third part of the presentation will discuss some of the research challenges. We need some form of real-time data mining, that is, the results have to be generated in real-time, we also need to build models in real-time for real-time intrusion detection. Data mining is also being applied for credit card fraud de-tection and biometrics related applications. While some progress has been made on topics such as stream data mining, there is still a lot of work to be done here. Another challenge is to mine multimedia data including surveillance video. Finally, we need to maintain the privacy of individuals. Much research has been carried out on privacy preserving data mining. In summary, the presentation will provide an overview of data mining, the various types of threats and then discuss the applications of data mining for malicious code detection and cyber security. Then we will discuss the consequences to privacy. About the speaker: Dr. Bhavani Thuraisingham joined The University of Texas at Dallas in October 2004 as a Professor of Computer Science and Director of the Cyber Security Research Center in the Erik Jonsson School of Engineering and Computer Science. She is an elected Fellow of three professional organizations: the IEEE (Institute for Electrical and Electronics Engineers), the AAAS (American Association for the Advancement of Science) and the BCS (British Computer Society) for her work in data security. She received the IEEE Computer Society's prestigious 1997 Technical Achievement Award for "outstanding and innovative contributions to secure data management."Dr Thuraisingham's work in information security and information management has resulted in over 70 journal articles, over 200 refereed conference papers and workshops, and three US patents. She is the au-thor of seven books in data management, data mining and data security including one on data mining for counter-terrorism and another on Database and Applications Security and is completing her eighth book on Trustworthy Semantic Web. She has given over 30 keynote presentations at various technical confer-ences and has also given invited talks at the White House Office of Science and Technology Policy and at the United Nations on Data Mining for counter-terrorism. She serves (or has served) on editorial boards of leading research and industry journals and currently serves as the Editor in Chief of Computer Stan-dards and Interfaces Journal. She is also an Instructor at AFCEA's (Armed Forces Communications and Electronics Association) Professional Development Center and has served on panels for the Air Force Scientific Advisory Board and the National Academy of Sciences. Dr Thuraisingham is the Founding President of "Bhavani Security Consulting" - a company providing services in consulting and training in Cyber Security and Information TechnologyPrior to joining UTD, Thuraisingham was an IPA (Intergovernmental Personnel Act) at the National Sci-ence Foundation from the MITRE Corporation. At NSF she established the Data and Applications Secu-rity Program and co-founded the Cyber Trust theme and was involved in inter-agency activities in data mining for counter-terrorism. She has been at MITRE since January 1989 and has worked in MITRE's Information Security Center and was later a department head in Data and Information Management as well as Chief Scientist in Data Management. She has served as an expert consultant in information secu-rity and data management to the Department of Defense, the Department of Treasury and the Intelligence Community for over 10 years. Thuraisingham's industry experience includes six years of research and development at Control Data Corporation and Honeywell Inc. Thuraisingham was educated in the United Kingdom both at the University of Bristol and at the Univer-sity of Wales.
Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference
Traditionally, host-based anomaly detection has dealt with system call sequences, but not with system call arguments. We propose a prototype which is capable of detecting anomalous system calls in an execution flow, thus helping in tracing intrusions. Our tool analyzes each argument of the system call, characterizing its contents and comparing it with a model of the content. It is able to cluster system calls and detect "different uses" of the same syscall in different points of different programs. It is also able to build a Markovian model of the sequence, which is then used to trace and flag anomalies. Stefano Zanero received a Ph.D. degree in Computer Engineering from the Politecnico of Milano technical university, where he is currently spending his post-doc. His current research interests include the development of Intrusion Detection Systems based on unsupervised learning algorithms, security of web applications and computer virology. He has been a speaker at international scientific and technical conferences, and he is the author and co-author of books and articles published in international, peer reviewed journals and conferences. He is a member of the board of the "Journal in Computer Virology", and acts as a reviewer for the "ACM Computing Reviews" and "IEEE Security&Privacy", as well as various primary international conferences. He is a member of the IEEE (Institute of Electrical and Electronics Engineers), the ACM (Association for Computing Machinery), and of ISSA (Information Systems Security Association). He has also been a columnist for Computer World Italy, and has been awarded a journalism award in 2003. Since 2004 he is a partner and CTO of Secure Network, a firm specializing in information security training and consulting, based in Milan."
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
"Traditionally, host-based anomaly detection has dealt with system call sequences, but not with system call arguments. We propose a prototype which is capable of detecting anomalous system calls in an execution flow, thus helping in tracing intrusions. Our tool analyzes each argument of the system call, characterizing its contents and comparing it with a model of the content. It is able to cluster system calls and detect "different uses" of the same syscall in different points of different programs. It is also able to build a Markovian model of the sequence, which is then used to trace and flag anomalies. Stefano Zanero received a Ph.D. degree in Computer Engineering from the Politecnico of Milano technical university, where he is currently spending his post-doc. His current research interests include the development of Intrusion Detection Systems based on unsupervised learning algorithms, security of web applications and computer virology. He has been a speaker at international scientific and technical conferences, and he is the author and co-author of books and articles published in international, peer reviewed journals and conferences. He is a member of the board of the "Journal in Computer Virology", and acts as a reviewer for the "ACM Computing Reviews" and "IEEE Security&Privacy", as well as various primary international conferences. He is a member of the IEEE (Institute of Electrical and Electronics Engineers), the ACM (Association for Computing Machinery), and of ISSA (Information Systems Security Association). He has also been a columnist for Computer World Italy, and has been awarded a journalism award in 2003. Since 2004 he is a partner and CTO of Secure Network, a firm specializing in information security training and consulting, based in Milan."