Monday, 29 September 2014

Cloudflare Attempts Lost SSL Key Risk with Keyless SSL


Cloudflare
With the increasing number of organizations worrying about and wanting the optimal security protection, San Francisco-based CloudFlare has announced new software which is specifically targeting this requirement.

According to CloudFlare, An SSL key is the data though which the organizations will be able to establish a highly secure connection with the customer they are trying to connect with. This data will enable the organizations to establish their own identity. Here comes the despair. If someone has the organization private SSL key, then they can authenticate as if you were the organization. One can spoof the identity as well as intercept the traffic.

According to Matthew Prince, CEO, what can be considered as a bay day is when a media organization loses an SSL key but a nightmare is reached when a financial institution loses the SSL Key. According to the senior writer at InfoWorld, Serdar Yegulalp, In a conventional SSL system, the private key that is used for login in all sessions is held in the same public-facing server as that of server used for fulfilling Web traffic. The potential risks of this system were depicted by the Heartbleed bug, wherein the private key information can be leaked out easily.

The Key is the Key (SSL): 

CloudFlare announced their new software called Keyless SSL, with the aim of targeting the organizations looking for a defending tool for themselves against the service attacks on their websites without them turning towards their private encryption keys. The organization will be utilizing the 28 data centers of CloudFlare around the world. Through this software companies will be able to use the cloud while controlling and maintaining their SSL. As per Sean Gallagher from Ars Technica, Keyless SSL will be able to break the encryption 'handshake' at the very start of the TLS (Transport Layer Security) web session, through this it will pass part of data to the data center of the company for further encryption.

Security: 

According to world’s renowned security experts Phil Zimmermann and Jon Callas “To limit the access is the one of the core feature of principles of computer security to restrict the access for cryptographic keys and now Keyless is best to implement this feature”

Enterprise: 

Davi Ottenheimer, a senior director of EMC Corporation, believes that Keyless SSL will be the fundamental innovation in the world of cyber security and everyone should concern about the risks of handing their private keys, when they give it to service providers.

The CloudFlare team was working on different means through which the banks can hold on to their private keys with the system being in development for years. This started over two years ago, post the call Prince received from Chief Information Security Officer of one of the world's largest banks. According to the CISO, they need assistance from Prince and his team on a certain issue.

According to John Clark, this new software will increase its importance among the banks that are at high risk from cyberattacks. By using the Keyless SSL, CloudFlare will be putting the servers in a completely lees secure data centers, wherein whenever the server is rebooted it leads to complete disappearance of data from the remote data centers. Through this the master encryption keys are never under any risk.

Tumor Pressure Transmitted Through Wireless Pressure Sensors

Wireless Pressure Sensors
The interstitial pressure present inside the tumor is most often higher than the normal tissues in comparison. This pressure becomes a hindrance in the release of chemotherapeutic agents apart from the decreasing the effectiveness expected from the radiation therapy.

There are medications existing to reduce the tumor pressure which allows an optimal window for diagnosis and start treatment but when the pressure is less, the medications becomes a test. Along with NIBIB support, Purdue University researchers have been able to develop sensors which can wirelessly transmit pressure readings from within a tumor.

Contents which will under pressure: 

Tumors just like other healthy living tissues needs oxygen and nutrients to stay alive. The tissues surrounding the tumors grow into the tumor to accommodate the high demands of the growing tumor. But when compared to the other healthy issues, these new tissues are highly disorganized and leaky. It has been attributed to the high pressure inside the tumor which makes these tissues highly abnormal and puts enough pressure to make the blood vessel leak fluids between the tumor cells (interstitial space).

While in a healthy normal tissue, regulated pressures pulls the nutrients and proteins out of tissues and send them to the interstitial space, which is at the end used up by cells. Medications travelling through the body also depend on these pressures, but when the pressure increases in the body just like in tumor, the medications are unable to leave the blood vessels.

Due to this reason, people suffering from tumor are often given less than the required chemotherapy dose or any other anti-cancer medicines. Radiation therapy needs oxygen to be effective but high interstitial pressure can reduce the oxygen level inside tumors.

Scope: 

Some of the recent clinical trials on animals have suggested that angiogenesis inhibitors (anti-cancer drugs) can actually reduce the interstitial pressure and contribute towards increasing the efficiency of the chemotherapy and radiation treatments. Angiogenesis inhibitors not only help in preventing the growth of new blood vessels but also stop the growth of tumor. According to some of the recent study, there is a window for complete normalization wherein the drugs are moving from blood to the tumors. However what comes as a challenge is the lack of methods that can be used for measuring interstitial tumor pressure, which is determine the optimal time to start the treatments.

Wireless Pressure Sensor: 

According to Babak Ziaie, director of the Biomedical Micro devices Laboratory at Purdue University, they consulted with many oncologists and determine that we need to work on creating a sensor for tumor pressure. It was a challenge as no one has though of working or was working on any concept related to this fact.

Now the team has been able to create a novel sensor which can implanted into a tumor and will be used for wirelessly transmitting interstitial fluid pressure readings. This sensor is adopted from Guyton capsule, a 1950 technology.

This device was tested by the team by implanting it in pancreatic tumors in mice and they were able to reduce the interstitial tumor pressure after which the angiogenic inhibitor was administered to the mice.
According to Tiffani Lash, program director for sensor technologies at NIBIB, it’s all about create and generating a novel technology to treat the disease.

Sunday, 28 September 2014

How to Setup Google Voice as Voicemail?

Google Voice is a package of services provided by Google which helps users to send text messages, customize their voicemail box, read voicemail as a text transcript etc. Google voice is a way to enable Unified Communications in one platform.

Text, Voice, Email all managed by one software application. This voicemail service which previously required a invite to setup now available free to all Gmail Account holders. This service enables them to have one number across all devices & locations, embedding mobile phones, work-desk phones, & VoIP lines. Related to specific callers user can choose which phone to ring when they call. There are some paid too features if in case you want to opt for them.

Google Voice
To link your numbers with your Google Account and to setup voicemail box follow below steps:

  • Go to more and click on even more tab.
    Google Voice 1
  • Now in the list, click on voice.
    Google Voice 2
  • Now you’ll be asked for two options, either you want to setup new number with your account or use an existing number. New number will be provided by Google repository based on your location.
    Google Voice 3
  • Type your area code and press search numbers.
    Google Voice 4
  • You’ll be shown list of free numbers from the free pool and based on your preferences you can choose the number and click on continue.
    Google Voice 5
  • For security reasons you’ll be asked to enter your pin and this pin will be used for authentication purpose in the future.
    Google Voice 6
  • If you want to add forwarding phone number now or can plan to do it later. Possible options are Home, Work etc.
    Google Voice 7
  • Once you’re done you’ll get a verification call from Google, here you just need to enter the number displayed on the screen.
    Google Voice 8
  • When your verification is done, you’re all set to your number as according to requirement.
    Google Voice 9
  • Now in the settings you can record you voicemail greetings, you can play the already recorded greetings, you can choose where you’ll the notification, set text forwarding & can also change the pin.
    Google Voice 10

Saturday, 27 September 2014

Personality Clone Software in the Next 5 Years

Digital Twin
According to John Smart, creative thinker and founder of the Acceleration Studies Foundation, technology is going to reach an ultimate level in the next 5 years. When we die, our families don’t have to visit our graves, they simply need to turn on the digital twins and can talk to them.

Smart utilizes many names for the technology which he is predicting, like digital twin or personal agent or even cyber self. But at the end all this is based in the same concept and that is a computer based version of you. The digital twin will be able to repeat interest and values of the people and this can be done through various gathered strategies and organized data. Smart has written that these digital twins will be able to input archived email and user writing, real time wearable smart phones and give verbal feedback to enhance the intelligent and productive guidance of the user. This will be handy in purchase, communication, feedback and learning activities of the user. This technology will be able to displace all the information from a real person to their cyber twin.

Smart has also stated that at one point of time this digital twin will be able to replicate the human emotions and facial expressions. Even though this concept might sound too far stretched, it is relying on the fact that today most of the people are forming relationships online. With the computer science advancing, this will only improve the connection and strengthen their bond with identities which may be not real.

According to Smart it is all about creating a world for people wherein they have someone who are looking for values. For the digital twin to attain complete potential, they need semantic maps and a good conversational interface.

Conversational Interfaces (CI): 

Smart wants the people to be able to engage with this technology and wants them to able to hold conversation with them. Even though many companies have been able to implement similar range of technologies, but none of them have been seems to be boasting about it. Through this technology the computer has a stored memory of the context and memory exchange.

Valuecosm:

The digital twin will be able to interact with the users, based on the information retrieved from the store emails and then formulate a data having the interest and values. This twin will be able to help a person to even choose a product that suits their interest. Based on the information given to this digital twin, they will be able to give direction through the wearable device. Through the valuecosm one can change the settings of the device anytime.

We are looking for a future wherein we can have a control over the algorithmic interface of our identity. This idea was basically developed for increasing and improving advertising.

Privacy:

General public is always worried about their privacy online. Google and some of the other companies have already been targeted for extracting personal information of the people. But with the digital twin technology, online privacy might be at high risk as one need to share their information with the companies so that they can access and optimize the technology further.

As per Smart, it will take more than 5 year to use all the available technologies and develop personal agents.

How Cloud Computing Can Help Your Small Business


Cloud Computing
Cloud computing has been capturing the imagination of tech geeks for some time now, immersing themselves in the potential it has to revolutionise people’s lives and businesses.

A lot of small businesses have not greeted the technology with the same enthusiasm however and remain reluctant to succumb to its charms. This is in spite of the fact that industry commentators have for some time been encouraging business to switch to it.

They see it’s many advantages in terms of cost, efficiency and selling opportunities. This is particularly true for the small business as it levels the playing field and allows them to compete more competitively with larger multi-nationals.

A lot of the small businesses who have embraced cloud technology are still using a hybrid set-up and are not yet running private clouds, perhaps put-off by the initial outlay or concerns over the protection of data. However, if you listen to what the experts say about data in the Cloud it is clear that it’s secure and can be easily accessed.

So what benefits do cloud computing systems offer the small business? What tangible benefits can they expect?

Apps for small businesses

There are now cloud-based apps available for almost every conceivable business process; from file storage and sharing apps such as MozyPro and Box to collaboration apps such as Webex and videoconferencing services such as Skype.

There are also a number of business specific apps for things like accounting and payroll as well as apps for collating customer data and sales strategies. Cloud technology allows smaller businesses to enjoy the same level of performance as larger global businesses.

Remote working

While the Internet has opened up the possibilities of working from anywhere that has a Wi-Fi connection, the Cloud takes this capability to a new level. It allows employees to access private company documents and work files that are not available for streaming online.

Remote working helps make the most of an employee’s time, boosting productivity in the process.

Security

If a laptop is lost or stolen it can have some serious monetary implications. However if that data is stored in the Cloud it won’t be lost and can still be accessed regardless of what happens to the machine. This also applies if your computer crashes; no longer will you have to rely on complex disaster recovery plans. Cloud computing providers such as Dell’s cloud computing take care of most issues and ensure that businesses are able to capitalise on all of the benefits which this new form of working offers.