Search This Blog

Tuesday, September 10, 2013

Walking the Galapagos with Google

The next exotic locale for Street View: the Galapagos Islands,
land of giant tortoises and other unique species.
As reported by SlashDot: In the early days, Street View must have been a relatively easy project for Google to execute, considering the financial resources and employees at its disposal: strap a set of high-tech cameras to a fleet of vehicles and drive the latter around urban areas all over the world, recording every inch for viewers’ clicking-and-dragging pleasure.

But there’s only so much of the world accessible via well-paved roads (or close to gas stations, for that matter), which meant Google had to regress a bit: instead of cars, it began strapping all that fancy camera equipment to human beings, who are a little bit maneuverable over rough terrain and narrow dirt paths than a four-door sedan. Google sent its Street View cyborgs into the Grand Canyon, where they recorded the craggy pathways and steep cliffs. Then it sent them to some of the world’s highest peaks.

Now comes the next exotic locale: the Galapagos Islands, land of giant tortoises and other unique species, where Charles Darwin researched his famous theory of evolution.

“It’s critical that we share images with the world of this place in order to continue to study and preserve the islands’ unique biodiversity,” read a May 23 note on the Google Lat Long blog. “Today we’re honored to announce, in partnership with Charles Darwin Foundation (CDF) and the Galapagos National Parks Directorate (GNPD), that we've collected panoramic imagery of the islands with the Street View Trekker.”

The Street View effort extends to the waters surrounding the Galapagos Islands, where Google collaborated with the Catlin Seaview Survey to record undersea images.

The reason for Google’s Street View efforts goes beyond simply wanting to show off cool places. The battles around digital cartography have intensified over the past several quarters, especially after Apple decided to abandon Google’s mapping data in favor of generating its own. Larger IT firms have snatched up independent mapping firms left and right, hoping for an influx of new data and features that will give them some sort of edge.

The stakes couldn’t be higher: a mapping platform with millions of loyal users can extend a “halo effect” of sorts to the company’s other products; after Apple brought its own mapping data to iOS, any number of bloggers publicly mused over whether to switch to Android in order to keep using Google Maps (the early wonkiness of Apple’s revamped Maps app probably fueled a lot of those musings). That alone could keep Google innovating its Maps at a rapid pace. But the Galapagos tortoises are pretty cool, besides.

GPS That Lets You Keep Your Phone In Your Pocket To Foil Would-Be Muggers

As reported by Tech CrunchWhen walking through a sketchy neighborhood that you don’t know well, it doesn't always feel like a good idea to have your phone out. Disrupt Hackathon entrant Kovert is an app that allows you to keep your phone tucked away out of sight while giving you walking directions through buzz signals.
As makers Scott Jones and Andrew Askedall pointed out onstage, following a GPS app with your phone in hand says a few things: I have no idea where I am, and I have money and expensive electronics.
“We were at the bar down the street trying to think of ideas,” Jones said. “This is literally because the hostel we’re staying at for Disrupt is in the Tenderloin district.
Kovert is super simple. Plug in your end address, and your phone will guide you by buzzing when you reach intersections: once for a left, twice to go straight, three times to turn right, and ten times when you’ve reached your destination. All you have to do is remember which buzzes mean what (but let’s be real, it’s way easier than Morse code.) If you miss the mark, Kovert will loop you back around.
Jones and Askedall, who are currently raising a seed round for another app called Kronicle, said they would like to build out Kovert to include a compass calculation feature in which it vibrates when you are pointing in the right direction.
Not only of use to hipsters trying to find their way to a warehouse party, the app also has the potential to be used as a tool for visually impaired people. Either way, this would definitely be a useful app to have on hand. But not in hand.

Net Neutrality In Court: Here's What You Need To Know

As reported by NPR: The beauty of the Internet — and the reason for its ubiquitous place in our lives — is that just about anyone can use it to offer services, products or information. But the link between what's out there on the Internet, how fast it gets to us and how much data can get to us is dependent on Internet service providers and the rules that govern them. That's where things get thorny for the principle of net neutrality.

If your eyes are already glazing over, consider this: This debate could affect the speed, quality and cost of your Hulu or Netflix binge-viewing.

Net neutrality is back in the news Monday because a landmark case is getting its day in a D.C. federal court. The case challenges whether the federal government can enforce net neutrality rules. Here's a primer to get you up to speed:

What Is Net Neutrality?
Net neutrality refers to the notion that's governed the Internet since the beginning — all Internet users deserve equal access to online information, no matter whether you use Verizon or Comcast. Internet service providers should be "neutral" to the content their customers consume.

The Way Things Are Now
As things are now, the Federal Communications Commission regulates net neutrality by "policing" an open Internet. The current rules, passed in 2010, prevent broadband Internet service providers from blocking lawful content and other Internet services. Time magazine sums up the three rules:
"First, the order requires ISPs to be transparent about how they handle network congestion; second, the ISPs are prohibited from blocking traffic such as Skype or Netflix on wired networks; third, the order outlaws 'unreasonable' discrimination, meaning the ISPs can't put such services into an Internet 'slow lane' in order to benefit their own competing services."
 The regulations don't fully cover wireless carriers, something that Internet rights groups aren't pleased with. The FCC says the exemption recognizes that the wireless Internet gets overused because of new customers constantly signing up and that carriers, therefore, need flexibility to put limits on use.

The Politics
President Obama supported net neutrality in his 2008 campaign, and then after he was sworn in, he appointed Julius Genachowski, a net neutrality supporter, as chairman of the FCC.

In December 2010, when the FCC approved a plan to implement the net neutrality regulations, the vote was 3-2, along party lines. Congressional Republicans argue that net neutrality is unnecessary government involvement that stifles innovation; the GOP-controlled House has even voted to strip the FCC of funding for net neutrality enforcement.

The Recent History
For nearly a decade, companies have challenged the net neutrality principle, a move they say better serves their customers.

In 2007, customers accused Comcast of "throttling," or purposely slowing down downloads. Comcast and other companies argued that they needed to discriminate between the bits of information being shared to conserve bandwidth given the growing number of customers on the Web. The FCC cited Comcast, Comcast appealed, and the same court hearing Monday's case decided the FCC didn't prove it had the authority to regulate broadband Internet.


The Case Before Judges
It's an understatement to say communications companies aren't pleased with existing FCC regulations. Verizon filed suit in federal court to overturn the rules, arguing the FCC overstepped its regulatory authority and that the rules are unnecessary. Verizon points out that the FCC has documented only four examples in the past six years of ISPs' possibly blocking content.

Verizon also said that net neutrality rules violate the First Amendment, since broadband companies transmit the speech of others. That gives the providers "editorial discretion," according to Verizon.
The FCC argues that it has the authority to enforce net neutrality under provisions of the Telecommunications Act of 1996 and the Communications Act of 1934.

Internet rights groups believe the open Internet is what lets companies like Twitter, Facebook and Skype flourish. Supporters say net neutrality prevented existing market players from slowing down or blocking the connections of Skype calls, for instance, to protect their businesses. As The New York Times lays out:
"The F.C.C. ... believes that Internet service providers must keep their pipelines free and open, giving the creators of any type of legal content — movies, shopping sites, medical services, or even pornography — an equal ability to reach consumers. If certain players are able to buy greater access to Internet users, regulators believe, the playing field will tilt in the direction of the richest companies, possibly preventing the next Google or Facebook from getting off the ground."
 The three judges on the U.S. Court of Appeals for the District of Columbia Circuit are hearing the case now.

The Implications
Advocates of net neutrality fear that if the federal government stops enforcing rules to keep the pipelines free and open, then certain companies will be able to get greater access to Internet users. That, they say, creates a system of haves and have nots — the richest companies could get access to a wider swath of Internet users, for example, and that could prevent the next Google from getting off the ground. GigaOm explains:
"If the courts decide the FCC doesn't have the legal authority to enforce the network neutrality rules, it not only could gut the rules, but it also gives ISPs a free pass to start making decisions about the information aspects of their service — and in today's non-competitive broadband environment — that could mean throttling Netflix or charging Google more money to deliver a clean YouTube stream. It also neuters the agency moving forward when all content will flow as information over broadband pipes — from TV to your doctor visits."
Judges aren't expected to issue a ruling for months. But now you're up to speed.

Monday, September 9, 2013

How Effective Fleet Management can Reduce Costs

As reported by Smart Business Online: Fleet tracking and management, if correctly implemented, can provide a business with a number of procedural, safety and cost efficiencies, says Noah Goodwin, CPCU, a commercial risk manager at RiskSOURCE® Clark-Theders.

“Fleet management can improve driving safety habits, which can reduce auto and workers’ compensation claims, and subsequently lower insurance costs. Morale can also be improved through increased safety,” Goodwin says. “Fleet tracking can help reduce fuel costs by increasing route efficiency, reducing idling time and impermissible usage.”

Smart Business spoke with Goodwin about how to effectively manage your fleet.

What exactly is fleet tracking, and how does it work?
The industry term for fleet tracking is vehicle telematics. In most cases, the system plugs in to your vehicles’ computers and provides a company with real-time data regarding each vehicle’s usage. Not only does it provide satellite vehicle positioning, but also it can provide instant notices for excessive acceleration or braking, or if someone is speeding. The GPS system will route the drivers in the most efficient manner and alert the company — the owner of the company or whoever is deemed responsible for the system — if its drivers are going out of the acceptable routes. You can identify which alerts you want to receive and set the threshold limits.

If you have a driver who tends to drive too fast or brake too hard, you can require additional training for that driver. If the poor habits continue, you could move him or her into a nondriving position.

Illustrating the effectiveness of such a system, a company installed vehicle telematics in its fleet and discovered one of its senior operators was 20 miles away from the job site where he was supposed to be. It turned out he was doing a side job with the company’s equipment and vehicles. Making employees aware of your ability to monitor their use of company vehicles can prevent this sort of behavior.

What are the keys for effective fleet management?
While it’s important to have a written program, the key is enforcement. Many companies will develop the program and not enforce it. By not enforcing the program you are incurring costs without realizing the potential benefits.

It can also get sticky in a couple areas. First, for human resources purposes, if you don’t follow the disciplinary procedures for one person but try to enforce them for another, you’re going to have a lawsuit. You need to be consistent.

Second, if your procedures say a driver who gets two speeding tickets within three years must be moved to a non-driving position, but you let that driver back on the road and he or she has an accident in a company vehicle that results in someone’s death, the company is going to be held liable. That’s not going to look favorable for your company in the eyes of a jury because the driver shouldn't have been on the road per the company’s own procedures.

What are some common fleet management mistakes? 
One persistent fleet management mistake is not following a maintenance program. If a vehicle isn't being maintained properly, it’s more prone to loss. Without good brakes or tread on the tires, there’s an increased likelihood a driver could rear-end another vehicle.

Personal usage of company vehicles is a problem area because many contractors have a truck that is their main mode of transportation. Insurance rates and job bidding are based in part on how far your employees drive every day. Allowing extra driving increases your fuel and maintenance costs, as well as your liability exposure.

Pre-screen drivers before you hire them. It costs just a few dollars to run a motor vehicle report, but it’s not always done prior to hiring. If you've hired a driver then find out he or she doesn't have an acceptable driving record, you may need to find the person a different job in your organization or terminate his or her employment.

Honda Demonstrates Pedestrian and Motorcycle Safety Technology

As reported by Motion Cars: Honda demonstrated two experimental safety technologies aimed at reducing the potential for collisions between automobiles and pedestrians and between automobiles and motorcycles.

These advanced Vehicle-to-Pedestrian (V2P) and Vehicle-to-Motorcycle (V2M) technologies, while still in the research and testing phase, demonstrate Honda’s vision to advance safety for all road users, including pedestrians and motorcycle riders, as well as automobile occupants.

These new technologies are part of a comprehensive effort being undertaken by Honda to develop leading-edge safety and driver assistive systems that can help predict and avoid traffic accidents through advanced sensing and communications technologies.



Vehicle-to-Pedestrian (V2P) Technology
Honda R&D has successfully demonstrated the ability of a car equipped with Dedicated Short Range Communications (DSRC) technology to detect a pedestrian with a DSRC enabled smartphone. This vehicle-to-pedestrian (V2P) technology uses cooperative communication between an individual’s smartphone and nearby vehicles and provides auditory and visual warnings to both the pedestrian and drivers.  The system is designed to mitigate the potential for a collision between the vehicle and pedestrian.

Using the pedestrian’s smartphone GPS, its dynamic sensing capability and DSRC wireless technology in the 5.9GHz band, the pedestrian’s smartphone and nearby vehicles establish a communications channel to determine if the pedestrian is in danger of being struck by an oncoming car. The V2P system is effective even when the pedestrian is not easily detectable by the driver, such as when stepping off a curb from behind a parked vehicle or other traffic obstruction.

A proprietary smartphone application determines the position, direction and speed of the pedestrian and, using DSRC technology, the position of surrounding vehicles. In the event of an impending collision as determined by the smartphone application, the system alerts the pedestrian via a repeating, high-volume beep and a warning on the screen of their smartphone.  At the same time, the system alerts the driver to the potential collision with an audible alarm and visual warnings on the vehicle’s heads-up display and navigation screen. In addition to the basic safety warnings, the vehicle can also receive information on whether the pedestrian is texting, listening to music, or on a phone call.

Vehicle-to-Motorcycle (V2M) Technology
Using the DSRC communication system, Honda’s Vehicle-to-Motorcycle (V2M) technology can determine the potential for a collision between a motorcycle and an automobile. The V2M system’s advantage is its ability to sense the presence of a motorcycle even when it is obstructed from the view of nearby automobile drivers.  The system provides auditory and visual warnings to the automobile driver. This system is being researched and tested in cooperation with the University of Michigan Transportation Research Institute.

U.S. Documents Detail Al-Qaeda’s Efforts to GPS-Jam Drones

As reported by the Washington Post: Al-Qaeda’s leadership has assigned cells of engineers to find ways to shoot down, jam or remotely hijack U.S. drones, hoping to exploit the technological vulnerabilities of a weapons system that has inflicted huge losses upon the terrorist network, according to top-secret U.S. intelligence documents.

Although there is no evidence that al-Qaeda has forced a drone crash or interfered with flight operations, U.S. intelligence officials have closely tracked the group’s persistent efforts to develop a counterdrone strategy since 2010, the documents show.

Al-Qaeda commanders are hoping a technological breakthrough can curb the U.S. drone campaign, which has killed an estimated 3,000 people over the past decade. The airstrikes have forced ­al-Qaeda operatives and other militants to take extreme measures to limit their movements in Pakistan, Afghanistan, Yemen, Somalia and other places. But the drone attacks have also taken a heavy toll on civilians, generating a bitter popular backlash against U.S. policies toward those countries.


Details of al-Qaeda’s attempts to fight back against the drone campaign are contained in a classified intelligence report provided to The Washington Post by Edward Snowden, the fugitive former National Security Agency contractor. The top-secret report, titled “Threats to Unmanned Aerial Vehicles,” is a summary of dozens of intelligence assessments posted by U.S. spy agencies since 2006.

U.S. intelligence analysts noted in their assessments that information about drone operational systems is available in the public realm. But The Post is withholding some detailed portions of the classified material that could shed light on specific weaknesses of certain aircraft.

Under President Obama and his predecessor, George W. Bush, drones have revolutionized warfare and become a pillar of the U.S. government’s counterterrorism strategy, enabling the CIA and the military to track down enemies in some of the remotest parts of the planet. Drone strikes have left al-Qaeda’s core leadership in Pakistan scrambling to survive.

U.S. spy agencies have concluded that al-Qaeda faces “substantial” challenges in devising an effective way to attack drones, according to the top-secret report disclosed by Snowden. Still, U.S. officials and aviation experts acknowledge that unmanned aircraft have a weak spot: the satellite links and remote controls that enable pilots to fly them from thousands of miles away.

In July 2010, a U.S. spy agency intercepted electronic communications indicating that senior al-Qaeda leaders had distributed a “strategy guide” to operatives around the world advising them how “to anticipate and defeat” unmanned aircraft. The Defense Intelligence Agency (DIA) reported that al-Qaeda was sponsoring simultaneous research projects to develop jammers to interfere with GPS signals and infrared tags that drone operators rely on to pinpoint missile targets.

Other projects in the works included the development of observation balloons and small radio-controlled aircraft, or hobby planes, which insurgents apparently saw as having potential for monitoring the flight patterns of U.S. drones, according to the report.

'Uncrackable' Quantum Codes set for use on Mobile Wireless Devices

A system that allows electronic messages to be sent with
complete secrecy could be on the verge of expanding beyond
niche applications - and into mobile computing.
As reported by BBC NewsA team of British scientists have discovered a way to build communications networks with quantum cryptography on a larger scale than ever before. 

Quantum cryptography has the potential to transform the way sensitive data is protected. 

Details appear in the Nature journal.
The system is based on a communication system, where information is carried by individual photons - single particles of light.
Once these single photons of light are observed, they change. That is, they cannot be intercepted by an "eavesdropper" without leaving a detectable trace.

Quantum key distribution

  • QKD is a method to share secret digital keys - random combinations of 0s and 1s - securely on a communication network
  • Those keys can then be used to encrypt or authenticate data to stop other people reading or altering it
  • Once two parties have swapped a key that they know to be safe they can be sure that the messages they are sending each other are secure
Secret communication
Until now, implementing a quantum cryptography network had required a new fiber and an elaborate photon detector for each additional user that was added to the network, at considerable expense.
The team says they have now extended the way to send uncrackable codes - referred to as "quantum key distribution" (QKD) - beyond very niche applications.
Andrew Shields of Toshiba's Cambridge Research Laboratory and colleagues, have demonstrated that up to 64 users can share a fiber link and detector.
The network works on standard optical fibers that allows information from multiple users to be combined and transmitted on a single fiber.
Encoding information on individual photons of light has the "unique virtue that it allows the secrecy of the communication to be tested", said Dr Shields.
"Now we can connect multiple users up to one single fiber and allow them to share a connection to a quantum network.
"The advantage of that is we can now build quantum networks with many more users than has been possible in the past, which also reduces the cost per user," he told BBC News.
Optical fibre spool and manExisting optic fiber networks can be used to carry quantum codes
The team said their work could make QKD more practical and was now closer to being a widespread technology that could be used by businesses, banks and government organisations.
Mobile cryptography
Hannes Huebel of Stockholm University, Sweden, said the new work was a breakthrough finding that demonstrated that QKD could soon be used more widely.
He said in the next decade people could even have a laser in their smartphones which would allow them to send encrypted information to others.
This is already one step closer to happening as this week a team from the University of Bristol, say they have developed a way of sending secret quantum messages on handheld devices.
The team, writing in a paper published on Arxiv.org, report: "This opens the way for quantum enhanced secure communications between companies and members of the general public equipped with handheld mobile devices, via telecom-fiber tethering."
Dr Huevel explained that at the moment the technology was still mainly lab-based with highly specialised people operating the technology.
"The aim is to go away from this to make it much user friendly and cheaper. This new research is one step closer, it's the last step between the end user and a proper network," Dr Huebel added.
'Middleman attacks'
Some however disagree that total security can be achieved with quantum cryptography.
Karl Svozil, a theoretical physicist at the Vienna University of Technology, Austria, said the protocol used in the current work was not secure against all eavesdropping methods and required that the classical channel must be uncompromised for quantum cryptography to work.
If there were active "middleman attacks", there could be "active eavesdropping", he said.
"The condition of quantum cryptography relies on certain rules that need to be obeyed - only then is it unconditionally safe. The newly proposed protocol is 'breakable' by middlemen attacks."

The quantum access network

Quantum key distribution system
  • Each bit of the secret key is encoded on a single particle of light (photon)
  • Quantum theory dictates that single photons cannot be intercepted without changing their encoding, this means an eavesdropper will always leave a trace
  • The signals from multiple users can be combined and transmitted on a single fibre
  • The receiver can be used to form a secret key with each transmitter
  • Can detect up to one billion photons per second allowing up to 64 users on one link