Wednesday, February 16

Internet of Things

The Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet. These devices range from ordinary household objects to sophisticated industrial tools. With more than 7 billion connected IoT devices today, experts are expecting this number to grow to 10 billion by 2020 and 22 billion by 2025. Oracle has a network of device partners.

Over the past few years, IoT has become one of the most important technologies of the 21st century. Now that we can connect everyday objects—kitchen appliances, cars, thermostats, baby monitors—to the internet via embedded devices, seamless communication is possible between people, processes, and things.

By means of low-cost computing, the cloud, big data, analytics, and mobile technologies, physical things can share and collect data with minimal human intervention. In this hyperconnected world, digital systems can record, monitor, and adjust each interaction between connected things. The physical world meets the digital world—and they cooperate.

While the idea of IoT has been in existence for a long time, a collection of recent advances in a number of different technologies has made it practical.
  • Access to low-cost, low-power sensor technology. Affordable and reliable sensors are making IoT technology possible for more manufacturers.
  • Connectivity. A host of network protocols for the internet has made it easy to connect sensors to the cloud and to other “things” for efficient data transfer.
  • Cloud computing platforms. The increase in the availability of cloud platforms enables both businesses and consumers to access the infrastructure they need to scale up without actually having to manage it all.
  • Machine learning and analytics. With advances in machine learning and analytics, along with access to varied and vast amounts of data stored in the cloud, businesses can gather insights faster and more easily. The emergence of these allied technologies continues to push the boundaries of IoT and the data produced by IoT also feeds these technologies.
  • Conversational artificial intelligence (AI). Advances in neural networks have brought natural-language processing (NLP) to IoT devices (such as digital personal assistants Alexa, Cortana, and Siri) and made them appealing, affordable, and viable for home use.
TO READ MORE ABOUT IoT,  CLICK HERE...

Mountain Range


 

Predictive Analytics


Predictive analytics
is the use of data, statistical algorithms and machine learning techniques to identify the likelihood of future outcomes based on historical data. The goal is to go beyond knowing what has happened to providing a best assessment of what will happen in the future.

Though predictive analytics has been around for decades, it's a technology whose time has come. More and more organizations are turning to predictive analytics to increase their bottom line and competitive advantage. 

Why now?

  • Growing volumes and types of data, and more interest in using data to produce valuable insights.
  • Faster, cheaper computers.
  • Easier-to-use software.
  • Tougher economic conditions and a need for competitive differentiation.

With interactive and easy-to-use software becoming more prevalent, predictive analytics is no longer just the domain of mathematicians and statisticians. Business analysts and line-of-business experts are using these technologies as well.

Organizations are turning to predictive analytics to help solve difficult problems and uncover new opportunities. Common uses include:

Detecting fraud. Combining multiple analytics methods can improve pattern detection and prevent criminal behavior. As cybersecurity becomes a growing concern, high-performance behavioral analytics examines all actions on a network in real time to spot abnormalities that may indicate fraud, zero-day vulnerabilities and advanced persistent threats.

Optimizing marketing campaigns. Predictive analytics are used to determine customer responses or purchases, as well as promote cross-sell opportunities. Predictive models help businesses attract, retain and grow their most profitable customers.

Improving operations. Many companies use predictive models to forecast inventory and manage resources. Airlines use predictive analytics to set ticket prices. Hotels try to predict the number of guests for any given night to maximize occupancy and increase revenue. Predictive analytics enables organizations to function more efficiently.

Reducing risk. Credit scores are used to assess a buyer’s likelihood of default for purchases and are a well-known example of predictive analytics. A credit score is a number generated by a predictive model that incorporates all data relevant to a person’s creditworthiness. Other risk-related uses include insurance claims and collections.
  READ MORE...

Pals


 

Russia Ready to FIRE

Provided by Global News...


A senior Russian military official said on Monday that Russia was ready to open fire on foreign ships and submarines that illegally enter its territorial waters, the Interfax news agency reported.

Any such decision would, however, be taken only at the “highest level,”, Stanislav Gadzhimagomedov, deputy head of the main operational department of the General Staff, was quoted as saying.

The comment came two days after Moscow said a Russian naval vessel had chased away a U.S. submarine in Russian waters in the Pacific. The United States denied it had carried out military operations in Russian territorial waters.

Tensions between the two countries are running high, with Washington warning that Russia could attack Ukraine at any time. Moscow denies any such intention, despite massing more than 100,000 troops near Ukraine’s borders, and has accused Western governments of hysteria.

Flashy


 

Tuesday, February 15

Dancing Males


Mainstream Media FAILS the test...


The mainstream media is getting a wake-up call after new allegations in the Durham investigation that President Trump and his campaign were being spied on.

Special Counsel John Durham (above left) released in a filing Saturday that the Hillary Clinton (above right) campaign hired techs to "infiltrate" Trump Tower and White House servers to establish a "narrative" to link Trump to Russia. The new findings contradict various doubtful media coverage from programs like CBS’ "60 Minutes."

In an October 2020 interview, Trump appeared on the newsmagazine to address the ongoing investigation and his claim his campaign was spied on. He was shot down by host Lesley Stahl, who insisted the president was spreading unverified information.

"There’s no real evidence," she said. "This is ’60 Minutes.’ We can’t put on things we can’t verify."

CLINTON CAMPAIGN PAID TO ‘INFILTRATE’ TRUMP TOWER, WHITE HOUSE SERVERS TO LINK TRUMP TO RUSSIA: DURHAM

Meanwhile, former CNN dynamic duo Don Lemon and Chris Cuomo criticized John Durham and the Trump administration back in December 2019 for being adamant about uncovering the truth, yet coming up short.

"Nothing happens and they just move on to the next conspiracy theory," Lemon said to Cuomo during a handover. "It is never going to end and guess what? People who want to believe that BS are going to believe it."

In an October 2021 episode of MSNBC's "The Rachel Maddow Show," host Rachel Maddow suggested the intention behind efforts to probe the investigation was always to re-route the investigation away from Trump himself.
   READ MORE...

Galloping Horse


 

North Korea Cyberattacks Working


North Korea’s cyberattacks became famous in 2014, when Pyongyang’s hackers targeted Sony Pictures, seemingly in retaliation for a satirical movie about North Korean leader Kim Jong Un. But the reclusive regime’s greatly improved cybercapabilities are not a joke. They’re a serious threat to the stability of the global economy and critical infrastructure systems.

North Korean hackers have gone on to bigger and more financially profitable targets. Since 2014, North Korean hackers have attacked Bangladesh’s central bank, the U.K. National Health Service, and, more recently, cryptocurrency exchanges. And the odds are that many more major North Korean cyberattacks are to come in the near future.

In internal regime discourse, Pyongyang proudly refers to its cyberoperations as its “all-purpose sword.” According to testimony from a South Korean intelligence chief, Kim reportedly stated: “Cyberwarfare, along with nuclear weapons and missiles, is an ‘all-purpose sword’ that guarantees our military’s capability to strike relentlessly.” Subversive, criminal operations are a style of asymmetric warfare long embraced by the North. 

The country’s founding leader, Kim Il Sung, earned his nationalist credentials by fighting Japanese colonialists in the 1930s. His guerrilla band later became the political elite of the North Korean state. During the Cold War era, Kim regularly deployed guerrillas to subvert and instigate the South Korean government. North Koreas hackers are the 21st-century version of guerrilla fighters, moving in the dark and striking at the most vulnerable points.

Historically, guerrillas often depended on banditry and robbery to survive—and one reason for the recent amping up of cyberattacks is financial worries. While Kim Jong Un’s recent missile tests garner international condemnation and head-shaking in Washington and Seoul, Pyongyang’s cyberoperatives work in the shadows. 

Due to the COVID-19 pandemic, North Korean borders have been sealed shut for the past two years. North Korean trade with China has largely stalled, and many foreign diplomats have left the country, making the already reclusive state even more isolated.  READ MORE...

Listen to the Rain


 

Internet of Behaviors


The Internet of Behaviors (IoB) is an area of research and development (R&D) that seeks to understand how, when and why humans use technology to make purchasing decisions. IoB combines three fields of study: behavioral science, edge analytics and the Internet of Things (IoT).

IoB platforms are designed to gather, aggregate and analyze data generated from a wide variety of sources, including household digital devices, wearable computers and human online activities. The data is then analyzed in terms of behavioral psychology to look for patterns that can be used by marketing and sales teams to influence future consumer behavior.

An important goal of the IoB is to help marketers understand and monetize the massive amount of data produced by network nodes in the Internet of Things.

The Internet of Behaviors is expected to play an important role in e-commerce, health care, customer experience management (CXM) and search engine optimization (SEO).

Potential IoB use cases include:
  • Reducing insurance premiums for drivers whose vehicles consistently report desired brake and acceleration patterns.
  • Analyzing a specific user's grocery purchases in order to personalize menu suggestions.
  • Using location services and buying history to customize a shopper's point-of-sale (PoS) promotions in real-time.
  • Sending an alert when a fitness activity tracker's data indicates the wearer's blood pressure is too high or too low.
TO READ MORE ABOUT IoB, CLICK HERE...

Flashing Colors


 

Monday, February 14

All About Ukraine

 


Ukraine ranks...


1st in Europe in proven recoverable reserves of uranium ores;

2nd place in Europe and 10th place in the world in terms of titanium ore reserves;

2nd place in the world in terms of explored reserves of manganese ores (2.3 billion tons, or 12% of the world's reserves);

2nd largest iron ore reserves in the world (30 billion tons);

 2nd place in Europe in terms of mercury ore reserves;

3rd place in Europe (13th place in the world) in shale gas reserves (22 trillion cubic meters)

4th in the world by the total value of natural resources;

7th place in the world in coal reserves (33.9 billion tons)

Ukraine is an agricultural country:

1st in Europe in terms of arable land area;

3rd place in the world by the area of black soil (25% of world's volume);

1st place in the world in exports of sunflower and sunflower oil;

2nd place in the world in barley production and 4th place in barley exports;

3rd largest producer and 4th largest exporter of corn in the world;

4th largest producer of potatoes in the world;

5th largest rye producer in the world;

5th place in the world in bee production (75,000 tons);

8th place in the world in wheat exports;

9th place in the world in the production of chicken eggs;

16th place in the world in cheese exports.

Ukraine can meet the food needs of 600 million people.

Ukraine is an industrialized country:

1st in Europe in ammonia production;

2-е Europe's and 4th largest natural gas pipeline system in the world (142.5 bln cubic meters of gas throughput capacity in the EU);

3rd largest in Europe and 8th largest in the world in terms of installed capacity of nuclear power plants;

3rd place in Europe and 11th in the world in terms of rail network length (21,700 km);

3rd place in the world (after the U.S. and France) in production of locators and locating equipment;

3rd largest iron exporter in the world

4th largest exporter of turbines for nuclear power plants in the world;

4th world's largest manufacturer of rocket launchers

The Most Valuable Companies in the WORLD


 

Nikki Haley on CHINA


 

Lighted Tree

Master Sergeant & Chef Andre RUSH


Andre Rush is an American celebrity chef and military veteran. Rush worked in the White House as a Chef for four administrations. Rush, a retired Master Sergeant of the US Army, gained attention for his large biceps and muscular physique.

Rush grew up in Columbus, Mississippi.  He played football in the position of running back at Lee High School in Columbus.  He holds a bachelor's degree in Business Management from Trident University International, an associate degree in Hotel Restaurant Management from Central Texas College and an associate degree from Culinary Stafford University.

Rush enlisted as active duty in the US Army in 1993. He has been deployed several times, and has served as a trainer in hand-to-hand combat and food service. In 1997, he began to cook at the White House. He has served the presidential administrations of Bill Clinton, George W. Bush, Barack Obama, and Donald Trump.  He worked at the White House part-time while simultaneously working at The Pentagon.  He was in the gym of the Pentagon when it was hit during the September 11, 2001 attacks, and chose to enlist in combat duties afterwards.

In June 2018, Rush received fame when he was photographed by CNN reporter Kate Bennett preparing a Ramadan meal for a White House dinner.  The photo of him cooking on the White House lawn during the annual White House Iftar dinner circulated on Twitter, and subsequently went viral.  Later that year, Rush signed a deal to produce a television show entitled Chef in the City.  He has since left his job as a White House chef.

In 2020, Rush attended the opening of a Salvation Army in Harrisburg, Pennsylvania, whereupon they gave him a celebration of service award.

Rush was a member of the U.S. Army Culinary Arts Team. In addition to cooking, Rush's other pursuits include ice carving, motivational speaking and life coaching.

Fitness
Rush is known for his physique and large 24 inch biceps that gave him notoriety on social media.  As a high school senior he reportedly could bench press 350 pounds (160 kg) while weighing just 150 pounds (68 kg).  In 2010, he was reported to be able to bench press 605 pounds (274 kg).   Rush states he does 2,222 pushups daily as part of the 22 pushup challenge, with the goal to raise awareness for the roughly 22 veterans who die by suicide every day.

In 2021, Men's Health published an article featuring Rush's daily routine, which included him eating eight meals a day and up to 10,000 calories and only sleeping for 2 hours every night.  Some of his claims were received with skepticism by the professional bodybuilding community.  SOURCE: Wikipedia

To visit the website of Chef Rush, CLICK HERE...

Tiger


 

Edge Computing


Edge computing is a distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible.

Data is the lifeblood of modern business, providing valuable business insight and supporting real-time control over critical business processes and operations. Today's businesses are awash in an ocean of data, and huge amounts of data can be routinely collected from sensors and IoT devices operating in real time from remote locations and inhospitable operating environments almost anywhere in the world.

But this virtual flood of data is also changing the way businesses handle computing. The traditional computing paradigm built on a centralized data center and everyday internet isn't well suited to moving endlessly growing rivers of real-world data. Bandwidth limitations, latency issues and unpredictable network disruptions can all conspire to impair such efforts. Businesses are responding to these data challenges through the use of edge computing architecture.

In simplest terms, edge computing moves some portion of storage and compute resources out of the central data center and closer to the source of the data itself. Rather than transmitting raw data to a central data center for processing and analysis, that work is instead performed where the data is actually generated -- whether that's a retail store, a factory floor, a sprawling utility or across a smart city. Only the result of that computing work at the edge, such as real-time business insights, equipment maintenance predictions or other actionable answers, is sent back to the main data center for review and other human interactions.

Thus, edge computing is reshaping IT and business computing. Take a comprehensive look at what edge computing is, how it works, the influence of the cloud, edge use cases, tradeoffs and implementation considerations.  READ MORE...