All posts by Danish Ahmed

McCarthy,Steve Jobs, Dennis Ritchie

Tribute: Geekdom Loses Three Greatest Minds In A Single Month.

McCarthy,Steve Jobs, Dennis RitchieI am not sure if it is an unfortunate coincidence or a sadistic prank by fate that three popular figures of the IT industry who died this month were all pioneers in their respective fields. If you don’t know who Steve Jobs is, I may be able to understand but you would have to be living under a rock to not know of his sad demise. While Steve Jobs died, after a long fight with pancreatic cancer, on 5th October 2011, exactly 1 week later a greater legend breathed his last.  Dennis Ritchie the creator of Unix and the C programming language was found dead in his home on 12th October 2011.  As if the loss to the digital world wasn’t devastating enough, 12 days later, on 24th October, John McCarthy, the inventor of LISP and the  concept of Artificial Intelligence, logged out of the world.

Continue reading Tribute: Geekdom Loses Three Greatest Minds In A Single Month.

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Google+ Takes The Next Step: Google+ API

Google+ may not be turning out the “Facebook-Killer” many predicted it to be, but as of yet it has been sailing smoothly. Providing API for developers was the next logical step and sure enough,yesterday it released Google+ API. Be it Facebook,Twitter or even Foursquare, nearly all successful social services provide development platform to facilitate developers build apps which eventually contributes to the success of the service. In fact Google is one of the earliest providers of Web APIs such as Search APIs,Google  Maps API. This would definitely  provide a boost to the 3-month old project which is now beginning to see decline in popularity after a period of rapid growth.

Continue reading Google+ Takes The Next Step: Google+ API

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Google’s Tryst With History,Facebook’s Fate

As most of you would be aware Facebook’s promised awesomeness turned out to be a one-to-one video chatting feature. Now is that really innovative ? It is something  that has already been introduced since almost a decade by companies now vanished. Of the barely surviving companies, ICQ introduced video chatting in 2007. In fact, for some inexplicable reason, I always feel ICQ was precursor of Twitter in a way. Going back to video-chatting, the much-touted Google+ Hangout feature isn’t the first group video chat either. I remember at least one service, ICU , which had similar features, then Yahoo Messenger + Public Chat + Group are so similar to the phenomenon that is now termed as Social Networking.

Continue reading Google’s Tryst With History,Facebook’s Fate

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Google +1: Key To Social Web Or Antidote To Panda

 

From the looks of it, Google‘s latest foray into social web, in the form of +1 button might end up with same fate as  its predecessors. In case you are unaware,it is the button at the top with +1 caption which according to Google official blog is digital shorthand for “this is pretty cool”  is the search engine giant’s reply to Facebook “Like”. The fact that Google replies with a sentence like “this is pretty cool” to Facebook’s four letter “Like”  may give us a rare insight on the mindset prevalent within Google’s team.  The 2 character button itself  may conform to the Web 2.0 trends,the descriptive sentence makes one wonder if  they have embraced Web 2.0 with all their hearts or are just going along with the tide. This would also explain why Google continues to fail in getting a foothold in Social Web.  Anyway, I am getting ahead of myself  😛 the pertinent to ask at this point of time is whether +1 is really going to be successful or not.

Continue reading Google +1: Key To Social Web Or Antidote To Panda

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
talking cars

Talking and Tweeting Cars: Future Belongs To Intelligent Vehicles

90% of innovation in automobile industry is driven by electronics and software according to IEEE New York Monitor. It is not talking carssurprising to find that all leading software giant,IBM, Microsoft,Google and Cisco have plunged headlong into the automotive sector. The major development seems to be centered around the concept of ECS – Electronics and Control Software to make commutation less hazardous and free of traffic snarls. Although GPS-based navigation systems,smartphone apps with real-time traffic updates are already in use,traffic congestion haven’t decreased. In fact, a study reports that an average American spent 34 hours in traffic,costing $808 in 2009, the total loss caused by gridlock was placed at $115 billion!

Although the study cited above was conducted in the USA,the finding can be related to other countries too,which explains why automobile companies are going for complex software to make cars safer and more efficient. Automobiles that can be managed with the help of smartphone apps (such as Chevrolet Volt whose energy level can be monitored by a smartphone app ) are already in use. Microsoft and Toyota are collaborating to network Toyota cars with Microft’s Azure cloud computing platform to bring telecommunications and GPS data, multimedia content and battery management capabilities. If features like streaming music and infotainment in general are introduced, can social networking be far ? Especially after the success of location-based social apps like Foursquare and Latitude which are really helpful when you are in a new city and chances are, when you are entering a new city, you would be in your own car. Apps that quickly find your places of interest or locate your friends and create best routes to reach them would be cool.

As a matter of fact, Ford did test run a tweeting car, a Ford Fiesta with cloud connectivity to explore how car safety and efficiency can be enhanced with cloud connectivity. The cloud-based car apps on a road trip labeled “American Journey 2.0 was able to to tweet, use Foursquare to locate nearby restaurants, gas stations and parks and even auto-blog (pun strongly intended).

Audi Autonomous TTS
Audi Autonomous TTS LA

However the latest frontier is that of vehicular communication or cars that “talk” to each other and with the grid and autonomous/ semi-autonomous cars. Many automobile companies are at various stages, developing these “autonomous cars”. German researchers have developed a car that can be controlled by thought while Virginia University students have developed a car that the blind can drive. Audi show cased its autonomous vehicle technology by letting its robotic car TTS successfuly complete a race to a peak through a rough terrain and of course, without a driver at the wheels.Volvo’s S60have been part of the first successful road train or platooning setup where the semi-autonomous cars have been programmed to follow the lead car by monitoring its speed,direction and distance.  Google’s autonomous cars that use artificial intelligence software to mimic human behavior have accumulated 14000 miles and are some of the best examples self-driving cars.

But large scale implementation seems more likely to be  on the lines of the Ford model that uses wi-fi signals to talk with other cars and has shown crash avoidance system using wi-fi signals,emitted 10 times a second and GPS data to communicate with the other car 900 feet away. In contrast to the current crash avoidance systems that use radar and require a a straight line to detect hazards,wi-fi and GPS mechanism provide a 360-degree visibility and are hence considerably advanced.  With the ability to communicate with other vehicles as well as  surrounding infrastructure, these “intelligent cars” can make commutation far more safer and efficient by sharing real-time data on traffic,speed,weather condition etc.  In fact the US Department  of  Transportation believes that that vehicle-to-vehicle communication has “potential to save a lot of lives” and has launched the Connected Vehicle Technology Challenge.

Of course, every new technology brings with it, its scope of being misused or exploited. How well the security measures are implemented would be crucial not just from the individual/ owner’s perspective but  from the social perspective also. Last year we saw attack on real time systems in the form of the worm called Stuxnet. One of the most sophisticated cyber-attacks in the history of computing, the Stuxnet worm was successful in sabotaging one of Iran’s nuclear plants and was one of the first instances of such a sophisticated  attack targeting industrial software. Though not identical, parallels can be drawn between the systems on the role software plays in both and the damage that can be caused by subverting it.  Apart from that, there are also threats of rogue hackers breaking into networks and causing havoc. In March 2010, more than 100 of drivers found their cars unusable or honking after a disgruntled former employee thought of taking revenge by abusing the web-based vehicle-immobilization system normally used to get the attention of consumers delinquent in their auto payments.  This was just an example, a terrorist or a psychopath is unlikely to be contented with that, the likely scenario is nightmarish.

 

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  

Sidejacking: How to prevent Firesheep from hijacking your session

Sidejacking, a technique of hijacking web sessions of other users in the network, has suddenly gained much attention on the Internet, thanks to a new Firefox extension Firesheep.

In a sidejacking session, the attacker sniffs data packets of the transactions over the network and steals cookie which the attacker can then use to impersonate the victim on the site the user is currently logged in. Even if they have encrypted login pages, unsecured HTTP sites use cookies to identify you during the entire session and this is what the attacker exploits. An attacker with certain tools can steal the cookie during transaction and use it to make the server treat the hijacker as the legitimate user. This vulnerability has existed since a long time but exploiting it was never so easy nor was it as alarming. Continue reading Sidejacking: How to prevent Firesheep from hijacking your session

Spread the love
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •