BolivarTech News

BolivarTech News

Technology Evolution and Trends

BolivarTech News
  • About
  • License

All posts by Julian Bolivar

Free Windows 10 Upgrade Finish Today

Windows-10-Box-WebToday June 29, 2016 is the last day when you can apply the Windows 10 Upgrade from the eligible platforms, and the next August 2 is expected the Window 10 Anniversary Update, and the begin of Windows as a Service.

The idea is that Windows will be away from being a monolithic product with periodic major releases to a product that is continually updated and tweaked, in a similar a model how iOS, OS X are updated.

Continue reading… →

2016-07-29 Julian Bolivar

Encryption Is Foundational to The Future (Part 4 The Reign of the Electro-Mechanical Cyphers)

SigabaAfter the Word War II and during the Cold War, the security in sensitive communications was ruled by Electro-Mechanical Cyphers.

Until the 1950’s the WWII the ECM Mark II was used by the NATO, when it was replaced by machines like the KL-7.

KL-7 was an electro-mechanical rotor-based off-line cipher machine, developed by the National Security Agency (NSA) and was introduced in 1952 and served for many years as the main cipher machine of the US and NATO.

Continue reading… →

2016-03-17 Julian Bolivar

NeuroBrain, In a Small Introduction to Deep Machine Learning.

You have the curiosity about how the machine learning process really is?

In this video you have a small example how machine learning really looks.

Continue reading… →

2016-03-12 Julian Bolivar

Encryption Is Foundational to The Future (Part 3 The Begin of the Technological Age)

Enigma_JapanesThe first world war showed the importance of cryptography on the battlefield, and the danger of weak encryption. The second world war became a defining moment in the history of cryptography and placed it squarely at the center of military and political strategy from that time to the present day.

The Enigma machine was developed by a German Arthur Scherbius in 1918 and was patented in 1919. It was marketed with portability and confidentiality as it sales features, but it had a lack of commercial success. When Germany discovered that they had lost WW I as a result of their cipher having been cracked by the British, despite the high cost, the machine was adopted by the German Navy in 1926, the Army in 1928 and the Air Force in 1935; also it was introduced into service with other sections of the German government.

Continue reading… →

2016-03-03 Julian Bolivar

Encryption Is Foundational to The Future (Part 2 The Century of Huge Advances)

OTPThe 20th century was marked by huge advances in all the humanity areas, and the cryptography not was the exception.

At the begin of the 20th century, cryptography was a labor intensive, error prone process, capable of transforming a small amount of written material into an encoded cipher text form.

With the advancement of communication technology, encryption and decryption came to be actively performed during World War I.

Continue reading… →

2016-02-25 Julian Bolivar

How to Handle OutOfMemoryError in Java

MemoryOne common indication of a memory leak is the java.lang.OutOfMemoryError exception. Usually, this error is thrown when there is insufficient space to allocate an object in the Java heap and the garbage collector cannot make space to accommodate a new object, and the heap cannot be expanded further. In this JorgeCode’s publication is explained how to handle it in JAVA.

convert-icon
Go to JorgeCode article: java.lang.OutOfMemoryError and X options

Julian Bolivar-Galeno is an Information and Communications Technologies (ICT) Architect whose expertise is in telecommunications, security and embedded systems. He works in BolivarTech focused on decision making, leadership, management and execution of projects oriented to develop strong security algorithms, artificial intelligence (AI) research and its applicability to smart solutions at mobile and embedded technologies, always producing resilient and innovative applications.

2016-02-22 Julian Bolivar

Credit Card numbers or IMEI in Java (Luhn Algorithm)

IMG-20160120-WA0000In order to validate large numbers like credit card and International Mobile System Equipment Identity (IMEI) in every smartphone or tablet over the planet is used the Luhn Algorithm; in this JorgeCode’s publication is explained how to implement it in JAVA.

convert-icon

Go to JorgeCode article: Credit Card numbers or IMEI in Java (Luhn Algorithm)

Julian Bolivar-Galeno is an Information and Communications Technologies (ICT) Architect whose expertise is in telecommunications, security and embedded systems. He works in BolivarTech focused on decision making, leadership, management and execution of projects oriented to develop strong security algorithms, artificial intelligence (AI) research and its applicability to smart solutions at mobile and embedded technologies, always producing resilient and innovative applications.

2016-02-22 Julian Bolivar

How can I remove old kernels/install new ones when /boot is full?

Ubuntu-640x480Some times when you try to update a Ubuntu your /boot partition is full, with this how-to published by JorgeCode explain how to solve this step by step.

convert-icon

Go to JorgeCode article: How can I remove old kernels/install new ones when /boot is full?

Julian Bolivar-Galeno is an Information and Communications Technologies (ICT) Architect whose expertise is in telecommunications, security and embedded systems. He works in BolivarTech focused on decision making, leadership, management and execution of projects oriented to develop strong security algorithms, artificial intelligence (AI) research and its applicability to smart solutions at mobile and embedded technologies, always producing resilient and innovative applications.

2016-02-22 Julian Bolivar

Bitcoin developer nominated to Nobel Prize in economics

Bitcoin is a digital asset and a payment system invented by Satoshi Nakamoto who published the invention in 2008 and released it as open-source software in 2009.
In this publication from JorgeCode explain how Nakamoto has been nominated for the Nobel Prize in Economics and the implications of this.

convert-icon

Go to JorgeCode article: Bitcoin developer nominated to Nobel Prize in economics

Julian Bolivar-Galeno is an Information and Communications Technologies (ICT) Architect whose expertise is in telecommunications, security and embedded systems. He works in BolivarTech focused on decision making, leadership, management and execution of projects oriented to develop strong security algorithms, artificial intelligence (AI) research and its applicability to smart solutions at mobile and embedded technologies, always producing resilient and innovative applications.

2016-02-22 Julian Bolivar

FBI Wants to Break the Apple

Broken-Apple-LockA federal judge ordered Apple to comply with the FBI’s request for technical assistance in the data recovery from the San Bernardino gunmen’s iPhone 5C.

In an open-letter published on Apple’s website, Tim Cook publicly challenged the US government and the FBI, saying what it is asking of the company fundamentally violates the privacy, security, and trust of its customers.

The White House spokesman Josh Earnest said the FBI request for access did not mean they were asking for a “back door” or unauthorized access into the company’s device or for it to be redesigned. “They are simply asking for something that would have an impact on this one device”.

Continue reading… →

2016-02-22 Julian Bolivar

Encryption Is Foundational to The Future (Part 1 The Beginnings)

Jefferson-wheel-cipher

Cryptography is a science that applies complex mathematics and logic to design strong encryption methods but also cryptography is an art. This art of hiding information from unauthorized eyes is with us from the beginning of the humanity and is related with the write invention.

Continue reading… →

2016-02-22 Julian Bolivar

You are the Social Networks’ Product…

bateriasFacebook, Twitter and other social networks expose your personal information far beyond your group of friends and remember that really you are not customers of them, you’re their product.

Continue reading… →

2016-02-22 Julian Bolivar

CuaimaCrypt, a Strong Cryptographic Alternative

CuaimaCrypt is a cypher designed by Julian Bolivar-Galeno in 2007, with improvements suggested by Jonathan Pastran during the development period.

CuaimaCrypt originally had two versions, CuaimaCrypt Stream Codec (CuaimaCrypt-SC) which was designed for hardware implementation, making encoding data streams in real time; and CuaimaCrypt Block Codec (CuaimaCrypt-BC) which was designed for software implementation because it uses the capacity of PCs to process data blocks efficiently.

Currently the most distributed and used is the CuaimaCrypt-BC and I will focus this article on it.

Continue reading… →

2016-02-22 Julian Bolivar

NSA Director says “Encryption is foundational to the future”

Mike RogersSpeaking to the Atlantic Council, a Washington, D.C., National Security Agency (NSA) Director Adm. Mike Rogers stressed that the cybersecurity battles the U.S. is destined to fight call for more widespread use of encryption, not less. “What you saw at OPM, you’re going to see a whole lot more of,” he said, referring to the massive hack of the Office of Personnel Management involving the personal data about 20 million people who have gotten background checks.

Watch Rogers’ talk here…

Continue reading… →

2016-02-22 Julian Bolivar

BlackEnergy and Stuxnet the first Cyber Weapons on a Global Cyberwarfare

Black_HoodWestern Ukraine power company Prykarpattyaoblenergo reported an outage on December 23 2015, saying the area affected included regional capital Ivano-Frankivsk, with a population of 1.4 million, during few hours.

Now at January 2016, the researchers have proof that link that outage with the malware called BlackEnergy.

Continue reading… →

2016-02-22 Julian Bolivar

NSA Believe that Current Cryptography Algorithms Are Broken by New Quantum Computers

Digital_AtomQuantum computing is a new way to build computers that takes advantage of the quantum properties of particles to perform operations on data in a very different way than traditional computers.

With this computational performance improvement came other risks, and more in the cryptography area where the security resides in apply to the plain data mathematical operations hard to replicate in a reasonable time without the knowledge of specific parameters values.

Continue reading… →

2016-02-22 Julian Bolivar

Quantum Computers are Already Here?

Quantum_ProcessorWe have years with the promise of a commercial quantum computer will be developed to solve complex problems at unprecedented speeds. But appear that “the future is now” with the first generation of commercial quantum computers.

Continue reading… →

2016-02-22 Julian Bolivar

Malfeasance by Cheatware

Software_Auditory During the past six years, Volkswagen was cheating on the emissions testing for its diesel cars because the cars’ computers were able to detect when they were being tested, and temporarily alter how their engines worked so they looked much cleaner than they actually were and when they weren’t being tested, the car produced 40 times more the pollutants.

Computers allow people new ways to cheat, because the cheating is at the embedded software and the malicious actions only happen when the expected conditions are presented, otherwise continue with the normal operation mode. Because the software is “smart” in ways that normal objects are not, the cheating can be subtle and harder to detect.

Continue reading… →

2016-02-22 Julian Bolivar

Now ‘iSpyU’ business is outsourcing

CellPhone.pngFrom unmemorable times always the governments have trying to collect intelligence information about people problematic for them within same folks. But this always was an “in house business” where the own government develop itself tools and procedures to accomplish the task; until now when the ‘iSpyU’ business can be outsourced by anyone thanks to products like the FinFisher Suite.

Continue reading… →

2016-02-22 Julian Bolivar

Hackers can be a Threat to Islamic State?

Anonymous GhostSecGroupThe next day after the terrorist attack to Paris perpetrated by the Islamic State (ISIS), the hacker association Anonymous published a video declaring the war to ISIS, and they in turn responded to these calling them ‘Idiots’; however, the hacker group Ghost Security Group and his partners are also fighting against ISIS before Anonymous’ announcement.

Continue reading… →

2016-02-22 Julian Bolivar

Posts navigation

1 2 Next →

Recent Posts

Embedded AI and Tiny Data

Right now we are living Artificial Intelligence (AI) boom bubble, where you can look the big progress that has been cooking in the labs for more than 30 years, some […]

More Info

Happy Thanksgiving!!!

More Info

Free Windows 10 Upgrade Finish Today

Today June 29, 2016 is the last day when you can apply the Windows 10 Upgrade from the eligible platforms, and the next August 2 is expected the Window 10 […]

More Info

The Artificial Intelligence is not Voodoo

The people in general demonize the things they do not understand, this is something that is happening from the beginning of the times. For example, before was the vaccines, organ […]

More Info
Powered by WordPress | theme SG Simple
Posting....