BolivarTech News

BolivarTech News

Technology Evolution and Trends

BolivarTech News
  • About
  • License

Embedded AI and Tiny Data

Right now we are living Artificial Intelligence (AI) boom bubble, where you can look the big progress that has been cooking in the labs for more than 30 years, some of that years the progress were stuck waiting for more powerful computers and algorithms’ improve, but now every day we see artificial intelligence systems that process huge amounts of data and make projections or take decision-based in huge computer clusters with hundreds or thousands of CPUs, GPUs and terabytes of memory and HDD storage, and in this case the AI is at the hand of Big Data because usually in machine learning and deep learning is needed a lot of information, usually tagged, to train the AI algorithms. But at the other end we can have machine learning and deep learning in embedded systems just based on the data recorded in the local environment, this data is known as “Tiny Data”.

In this embedded environment, the AI system has more challenges that his bigger brothers, because the computational resources like CPU, memory, storage and power are more limited and also it is part of a real-time system that needs to meet the deadlines to accomplish the main tasks expected by the users; also, the AI system need to deal with on-device data collection, which by its nature, will be less plentiful, unlabeled, but at least it is more targeted to the embedded application.

For example, at BolivarTech we just finished one costumer’s project where we provide the AI algorithms to be incorporated at one industrial water heater, because the costumer want to improve the efficiency by allowing the water heater learn the water temperature requirements and behaviors in it particular environment; based on this requirements the water heater need to collect data like water flow, ambient temperature, target temperature, time to reach the target temperature based in the incoming water temperature, etc. and based in this data collected predict the duty cycle needed in order to reduce the consumed energy to keep the water at the target temperature.

This is one example where the AI and the Tiny Data work together in order to improve one embedded system, providing to it a real smart behavior, for this in your next smart project contact us at BolivarTech about your artificial intelligence needs.

Julian Bolivar-Galeno is an Information and Communications Technologies (ICT) Architect whose expertise is in telecommunications, security and embedded systems. He works in BolivarTech focused on decision making, leadership, management and execution of projects oriented to develop strong security algorithms, Artificial Intelligence (AI) research and its applicability to smart solutions at mobile and embedded technologies, always producing resilient and innovative applications.

2017-02-21 jbolivarg

Happy Thanksgiving!!!

Happy Thanksgiving

2016-11-24 jbolivarg

Free Windows 10 Upgrade Finish Today

Windows-10-Box-WebToday June 29, 2016 is the last day when you can apply the Windows 10 Upgrade from the eligible platforms, and the next August 2 is expected the Window 10 Anniversary Update, and the begin of Windows as a Service.

The idea is that Windows will be away from being a monolithic product with periodic major releases to a product that is continually updated and tweaked, in a similar a model how iOS, OS X are updated.

Continue reading… →

2016-07-29 Julian Bolivar

The Artificial Intelligence is not Voodoo

Devil-AI-DD-2The people in general demonize the things they do not understand, this is something that is happening from the beginning of the times.

For example, before was the vaccines, organ transplants, etc. and now is the Artificial Intelligence (AI) turn. Is interesting for me with my AI knowledges and background read and watch how the people tend to provide skill and abilities to the AI that they are far away to have, and if are diabolic is more the sensationalism in the media.

Continue reading… →

2016-06-07 jbolivarg

Encryption Is Foundational to The Future (Part 4 The Reign of the Electro-Mechanical Cyphers)

SigabaAfter the Word War II and during the Cold War, the security in sensitive communications was ruled by Electro-Mechanical Cyphers.

Until the 1950’s the WWII the ECM Mark II was used by the NATO, when it was replaced by machines like the KL-7.

KL-7 was an electro-mechanical rotor-based off-line cipher machine, developed by the National Security Agency (NSA) and was introduced in 1952 and served for many years as the main cipher machine of the US and NATO.

Continue reading… →

2016-03-17 Julian Bolivar

NeuroBrain, In a Small Introduction to Deep Machine Learning.

You have the curiosity about how the machine learning process really is?

In this video you have a small example how machine learning really looks.

Continue reading… →

2016-03-12 Julian Bolivar

Encryption Is Foundational to The Future (Part 3 The Begin of the Technological Age)

Enigma_JapanesThe first world war showed the importance of cryptography on the battlefield, and the danger of weak encryption. The second world war became a defining moment in the history of cryptography and placed it squarely at the center of military and political strategy from that time to the present day.

The Enigma machine was developed by a German Arthur Scherbius in 1918 and was patented in 1919. It was marketed with portability and confidentiality as it sales features, but it had a lack of commercial success. When Germany discovered that they had lost WW I as a result of their cipher having been cracked by the British, despite the high cost, the machine was adopted by the German Navy in 1926, the Army in 1928 and the Air Force in 1935; also it was introduced into service with other sections of the German government.

Continue reading… →

2016-03-03 Julian Bolivar

Encryption Is Foundational to The Future (Part 2 The Century of Huge Advances)

OTPThe 20th century was marked by huge advances in all the humanity areas, and the cryptography not was the exception.

At the begin of the 20th century, cryptography was a labor intensive, error prone process, capable of transforming a small amount of written material into an encoded cipher text form.

With the advancement of communication technology, encryption and decryption came to be actively performed during World War I.

Continue reading… →

2016-02-25 Julian Bolivar

How to Handle OutOfMemoryError in Java

MemoryOne common indication of a memory leak is the java.lang.OutOfMemoryError exception. Usually, this error is thrown when there is insufficient space to allocate an object in the Java heap and the garbage collector cannot make space to accommodate a new object, and the heap cannot be expanded further. In this JorgeCode’s publication is explained how to handle it in JAVA.

convert-icon
Go to JorgeCode article: java.lang.OutOfMemoryError and X options

Julian Bolivar-Galeno is an Information and Communications Technologies (ICT) Architect whose expertise is in telecommunications, security and embedded systems. He works in BolivarTech focused on decision making, leadership, management and execution of projects oriented to develop strong security algorithms, artificial intelligence (AI) research and its applicability to smart solutions at mobile and embedded technologies, always producing resilient and innovative applications.

2016-02-22 Julian Bolivar

Credit Card numbers or IMEI in Java (Luhn Algorithm)

IMG-20160120-WA0000In order to validate large numbers like credit card and International Mobile System Equipment Identity (IMEI) in every smartphone or tablet over the planet is used the Luhn Algorithm; in this JorgeCode’s publication is explained how to implement it in JAVA.

convert-icon

Go to JorgeCode article: Credit Card numbers or IMEI in Java (Luhn Algorithm)

Julian Bolivar-Galeno is an Information and Communications Technologies (ICT) Architect whose expertise is in telecommunications, security and embedded systems. He works in BolivarTech focused on decision making, leadership, management and execution of projects oriented to develop strong security algorithms, artificial intelligence (AI) research and its applicability to smart solutions at mobile and embedded technologies, always producing resilient and innovative applications.

2016-02-22 Julian Bolivar

How can I remove old kernels/install new ones when /boot is full?

Ubuntu-640x480Some times when you try to update a Ubuntu your /boot partition is full, with this how-to published by JorgeCode explain how to solve this step by step.

convert-icon

Go to JorgeCode article: How can I remove old kernels/install new ones when /boot is full?

Julian Bolivar-Galeno is an Information and Communications Technologies (ICT) Architect whose expertise is in telecommunications, security and embedded systems. He works in BolivarTech focused on decision making, leadership, management and execution of projects oriented to develop strong security algorithms, artificial intelligence (AI) research and its applicability to smart solutions at mobile and embedded technologies, always producing resilient and innovative applications.

2016-02-22 Julian Bolivar

Bitcoin developer nominated to Nobel Prize in economics

Bitcoin is a digital asset and a payment system invented by Satoshi Nakamoto who published the invention in 2008 and released it as open-source software in 2009.
In this publication from JorgeCode explain how Nakamoto has been nominated for the Nobel Prize in Economics and the implications of this.

convert-icon

Go to JorgeCode article: Bitcoin developer nominated to Nobel Prize in economics

Julian Bolivar-Galeno is an Information and Communications Technologies (ICT) Architect whose expertise is in telecommunications, security and embedded systems. He works in BolivarTech focused on decision making, leadership, management and execution of projects oriented to develop strong security algorithms, artificial intelligence (AI) research and its applicability to smart solutions at mobile and embedded technologies, always producing resilient and innovative applications.

2016-02-22 Julian Bolivar

FBI Wants to Break the Apple

Broken-Apple-LockA federal judge ordered Apple to comply with the FBI’s request for technical assistance in the data recovery from the San Bernardino gunmen’s iPhone 5C.

In an open-letter published on Apple’s website, Tim Cook publicly challenged the US government and the FBI, saying what it is asking of the company fundamentally violates the privacy, security, and trust of its customers.

The White House spokesman Josh Earnest said the FBI request for access did not mean they were asking for a “back door” or unauthorized access into the company’s device or for it to be redesigned. “They are simply asking for something that would have an impact on this one device”.

Continue reading… →

2016-02-22 Julian Bolivar

Encryption Is Foundational to The Future (Part 1 The Beginnings)

Jefferson-wheel-cipher

Cryptography is a science that applies complex mathematics and logic to design strong encryption methods but also cryptography is an art. This art of hiding information from unauthorized eyes is with us from the beginning of the humanity and is related with the write invention.

Continue reading… →

2016-02-22 Julian Bolivar

You are the Social Networks’ Product…

bateriasFacebook, Twitter and other social networks expose your personal information far beyond your group of friends and remember that really you are not customers of them, you’re their product.

Continue reading… →

2016-02-22 Julian Bolivar

CuaimaCrypt, a Strong Cryptographic Alternative

CuaimaCrypt is a cypher designed by Julian Bolivar-Galeno in 2007, with improvements suggested by Jonathan Pastran during the development period.

CuaimaCrypt originally had two versions, CuaimaCrypt Stream Codec (CuaimaCrypt-SC) which was designed for hardware implementation, making encoding data streams in real time; and CuaimaCrypt Block Codec (CuaimaCrypt-BC) which was designed for software implementation because it uses the capacity of PCs to process data blocks efficiently.

Currently the most distributed and used is the CuaimaCrypt-BC and I will focus this article on it.

Continue reading… →

2016-02-22 Julian Bolivar

NSA Director says “Encryption is foundational to the future”

Mike RogersSpeaking to the Atlantic Council, a Washington, D.C., National Security Agency (NSA) Director Adm. Mike Rogers stressed that the cybersecurity battles the U.S. is destined to fight call for more widespread use of encryption, not less. “What you saw at OPM, you’re going to see a whole lot more of,” he said, referring to the massive hack of the Office of Personnel Management involving the personal data about 20 million people who have gotten background checks.

Watch Rogers’ talk here…

Continue reading… →

2016-02-22 Julian Bolivar

BlackEnergy and Stuxnet the first Cyber Weapons on a Global Cyberwarfare

Black_HoodWestern Ukraine power company Prykarpattyaoblenergo reported an outage on December 23 2015, saying the area affected included regional capital Ivano-Frankivsk, with a population of 1.4 million, during few hours.

Now at January 2016, the researchers have proof that link that outage with the malware called BlackEnergy.

Continue reading… →

2016-02-22 Julian Bolivar

NSA Believe that Current Cryptography Algorithms Are Broken by New Quantum Computers

Digital_AtomQuantum computing is a new way to build computers that takes advantage of the quantum properties of particles to perform operations on data in a very different way than traditional computers.

With this computational performance improvement came other risks, and more in the cryptography area where the security resides in apply to the plain data mathematical operations hard to replicate in a reasonable time without the knowledge of specific parameters values.

Continue reading… →

2016-02-22 Julian Bolivar

Quantum Computers are Already Here?

Quantum_ProcessorWe have years with the promise of a commercial quantum computer will be developed to solve complex problems at unprecedented speeds. But appear that “the future is now” with the first generation of commercial quantum computers.

Continue reading… →

2016-02-22 Julian Bolivar

Posts navigation

1 2 Next →

Sponsors


BolivarTech.com

Valhala Networks

Recent Posts

  • Embedded AI and Tiny Data
  • Happy Thanksgiving!!!
  • Free Windows 10 Upgrade Finish Today
  • The Artificial Intelligence is not Voodoo
  • Encryption Is Foundational to The Future (Part 4 The Reign of the Electro-Mechanical Cyphers)

Donations

Categories

  • Artificial Intelligence
  • Cryptography
  • Edge Technology
  • Embedded Systems
  • General
  • News
  • OS
  • Programming
  • Security
  • Uncategorized

BolivarTech

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
Powered by WordPress | theme SG Simple
Posting....