www.technowize.com
1 / Technowize Magazine / August 2015
MAKE SURE HE NEVER RUNS OUT OF BOOKS TO READ WWW.TRAVELINGSTORIES.ORG
$10= BOOKS 3 TO A KID IN NEED
TWITTER.COM/TRVLINGSTORIES
INSTAGRAM.COM/TRAVELINGSTORIES
OUTSMARTING POVERTY ONE BOOK AT A TIME
FACEBOOK.COM/TRAVELINGSTORIES
Editor’s Note August 2015
H
uman Evolution began nearly 6 million years ago and it stands as a testament to the litany process that our ancestors went through to ultimately become anatomically modern humans. We have brains roughly three times as large as those of our early ancestors that lived 4 million to 2 million years ago. Given evolution’s trajectory, could creating artificially created cognitive beings be the next chapter of humanity? A startling thought, but the history of evolution indicates that we may be the last apes standing in a sea of cyber sapiens. The lines between humans and machines, biology and technology, reality and virtuality, all seems to be dramatically consumed by our desire to coevolve our tools.Transhumanists foretell a time when sentient beings will emerge who will literally be part biology and part machine.It makes sense. The very premise of Artificial Intelligence technology is its ability
to continually learn from the data it collects. Embedded data is a goldmine that will dramatically consume the decaying errors in our attempts to create cognitive beings.This is growing pains as it evolves, however, the positive effect that it will have on the society is immeasurable.Perhaps, we should stop looking at it as another burden to our primal luggage? In Banking on Evolution: Robotic Survival Instinct, page 56 we explore how AI researchers are creating robots, who, when something is broken, look into a diagnosis to know what is wrong, and then try to find a solution for it using patterns embedded into the system. The embedded patterns, equivalent of innate knowledge, could help robots overcome a myriad of situational problems accomplish their objectives in space exploration, disaster relief, and oil drilling. Plunge in. In Trendspotting, page 46, we find out how companies are building AI 3 / Technowize Magazine / August 2015
technology with a deep understanding of how people communicate online to gain a wealth of experience and cut down cyber bullying. In Haute Money,page 10, we talk about carhacking, Apple earnings, Robots Vs Humans Football Championship, and many more interesting stories. For luxury connoisseurs, Technopolis offers a cornucopia of unique and exclusive luxe gadgets and gizmos, see page 28. Did you know that Google’s first data center was Larry Page’s dorm room? A look inside Google’s cuttingedge,massive data center spread across a few hundred miles north of Charlotte, North Carolina. As the
world’s largest tech companies turn to clean power to run their data centers, we find out how Google embraced a sustainable clean power option to provide power for its data center that consumers a couple percentage points of U.S. energy.Find out more in Hardware, Inc. on page 68. Elsewhere, this issue, we delve into building virtual reality worlds with the best augmented apps in App Labs, page 98. Futurist, page 86, we explore the evolving face of Makani Power, a startup building power-generating airborne-wind turbines, a Google X Moonshot project that will radically change the future. Enjoy our August issue…
Like always, we welcome your comments (facebook.com/Technowize, @ technowize on Twitter). You may reach us at editor@technowize.com or Editor - Technowize, The Fastest Media, 3651 Lindell Road, Suite 320D, Las Vegas, NV 89103.
4 / Technowize Magazine / August 2015
5 / Technowize Magazine / August 2015
Content Features
42
The Impossible TO Hack turing phone
016
Dark Days for Apple, Yahoo, and Microsoft Investors?
028
In the Lair of Luxury Gadgets
046
Avenger Bots to Fight Internet Trolls
090
Google’s Project Makani
100
The Best of Augmented Reality Apps
6 / Technowize Magazine / August 2015
010
Haute Money
028
Technopolis
056
Cover Story
082
Diary of a Technopreneur
098
App Labs
114
Tech Ed
120
Tech Events & Conferences
52
Winning the War against Trolls
68
A Walk through the Data Centre that Powers World’s Largest Search Engine 7 / Technowize Magazine / August 2015
The Team Editorial Anna Domanska, Editor-in-Chief Christy Gren, Sub-Editor Riana Petanjek, Sub-Editor Priyansha Mistry, Sub-Editor Aubrey Chang, Associate Editor
Design Kevin Paul Sr. Grahpic Designer
Project Management Tony Raval Project Director Jay Raol Project Director
8 / Technowize Magazine / August 2015
Marketing Jason Miller, Sr. Project Director
Advertising Richard Dean, Advertising Manager
96
Technology John Hancock, Head-Web Department Le Manh Coung, Sr Sofrware Coordinator Julia Hunt, Magazine Production
Finance Control R R Baratiya
114
9 / Technowize Magazine / August 2015
10 / Technowize Magazine / August 2015
Haute Money Bringing you the latest cult coverage straight from the tech world - find out about people and companies defining the cutting edge of technology and shaping leaders of the future: entrepreneurs coming from situations set against the backdrop of humble environments.
11 / Technowize Magazine / August 2015
Haute Money
Better Late than Never, Microsoft finally joins the big league for fight against ‘Revenge Porn’
12 / Technowize Magazine / August 2015
Microsoft finally joins hands with fellow tech moguls Google, Twitter, Facebook and Reddit, to fight against ‘revenge porn’. It will be offering help to the victims by taking down the links of sexually explicit materials like images and videos, which were posted without their consent. Microsoft states that it will help victims make the takedown requests. The explicit materials that have been posted without the subject’s consent will be deleted permanently from Bing and other storage platforms like Xbox Live or One Drive, as per the individual complaints. Links or contents will be removed globally. In order to make the process more convenient and easier,
the company has established a reporting page, where an individual can request a complaint. Currently, the page is only available in English but in the coming weeks it will be extended in other languages as well. It also encourages people to go through Without My Consent and Cyber Civil Rights Initiative for more information. The rise in revenge porn is at a peak across the globe. It continues to damage many aspects from a subject’s life. Most severe cases have even led to crime and suicide cases. Sadly, removing the links to such contents is only a small step towards uprooting revenge porn websites, but it will definitely stop the further distribution.
13 / Technowize Magazine / August 2015
Haute Money
14 / Technowize Magazine / August 2015
Car-Hacking turned real?
– SUV
disabled on a busy highway by hackers Car hacking, the worst nightmare of driver’s life, or let us just say a ‘Car-Jack?’ The increasing amount of wireless additions to our cars by the automakers leaves it open for hackers to hack using wireless systems. In a rush to roll out the ever rising next big thing, they have left an easy access for data trackers, hackers and internet assassins. A while ago, WIRED writer Andy Greenberg was involved in a very unusual road test - he became a victim of car hack incident, when the accelerator suddenly stopped and the car came to a halt in an ice freeze situation, while driving on highway. Similar such incidents of car hacking have left the government and people into mulling over nasty car attacks. Not different from other technologies in routine devices, cars are connected to the Internet or Wi-Fi systems, which enable the drive to use GPS, watch videos and
stream live news or music, but this exposes the car and the driver to hackers ultimately. The Uconnect or wireless system not only allows the hackers to control the locks and engine, it also provides them the access to cut the brakes and take over the steering wheel while the car is in reverse mode. The controlled demonstrations prove how scary and dangerous it would turn out if hacker takes over the car controls. The incidents highlight the sheer horror and security exposures of automobiles. Government is trying to take measures by aiming the bill which will lead to a breakout invention for keeping internet connected cars safe. They feel, the drivers do not have to choose amongst being protected or connected, instead there must be a road protocol to protect car from hackers as well as from data trackers.
15 / Technowize Magazine / August 2015
Haute Money
16 / Technowize Magazine / August 2015
Dark Days for Apple, Yahoo, and Microsoft Investors? Is Silicon Valley under a dark spell? Market downfall, losing the significance or just few wrong investments to be blamed for sudden drop in shares? What is going on in the South Bay? Global investors of tech titans have been out of sorts and in a state of deep panic after a shocking release of fiscal Q3 2015 earnings. What significantly made investors’ crash to the ground was a huge drop in shares of Apple, Microsoft, and Yahoo. MICROSOFT reported a big loss, mostly because of its troubled takeover of former mobile brand Nokia. The company reported for strong sales from its cloud and hardware services. It is now planning to scale back its effort by focusing on hardware. Cloud services are going on track so far. No doubt that the company is going through a major transition phase, leaving investors with no clue of what to plan ahead. It will be concentrating on developing softwares for various platforms. APPLE is on the opposite end of the whole ordeal. The iconic company even after beating the estimated mark, is not able to satisfy its investors. That is how the company managed to lose its market value by approximate $60 billion, even though apple posted $10.7 billion profit and over the previous year it witnessed a hike in iPhone sales by 35%. For Smartphone sales this figure is quite good, but it’s hard to please Apple investors. It’s time Apple needs to crush these estimates? YAHOO has had an extremely unimpressive quarter. Although revenue seemed to have crossed the analyst expectations, but the cost to get customers from rivals like Google and Bling was high. Profit was down by 16 cent shares, which are only 2 cents down by the expected share of 18 cents. Yahoo is one of the largest web bases, so investors expect it to come up with new strategies to evolve the brand in a great way.
17 / Technowize Magazine / August 2015
Haute Money
18 / Technowize Magazine / August 2015
Attack on Hacking Team spills Global Cyber spying Secrets On July 5, 2015, an antisurveillance crusader blazoned a ginormous, 400-gigabyte chunk on Bit Torrent of internal documents from the mysterious Italian surveillance firm Hacking Team on the company’s official Twitter feed. Five days after suffering the massive attack, the security firm is still scrimmaging to cap the damage and figure out how exactly the perpetrators racked up the data breach. The anonymous hacker hijacked HT’s official Twitter account and continued to post screenshots of email communications, client lists – including some such as the FBI, invoices, price lists, and other tons of critical data and, even passwords to crucial systems on Twitter. According to leaked data, Hacking team has been paid approximately $775,000 by the FBI for remote control service. This service illicitly transfers the target’s data, as well as allows remote users to access through target’s microphones and webcams. The United States Air Force and the Pentagon are suspected for using services by the hacking company. Ethiopian Government paid $828,000 for the same system
along with few other services, which included software allowing people within the network of the Ethiopian government to hack into the U.S. based employee’s data. The breached data reported the list of over 40 countries, which includes Germany, UAE and Oman, with their itemized bill totaling 4,324,350 Euro. Along with all the documents and data, a price list of all the services being offered by Hacking Company is also leaked on the websites. The price for stealing emails or remotely accessing the activities of someone via webcam on windows or Linux platform would be 40,000 Euro. Similarly, Android and BlackBerry costs 30,000 Euros. iPhone costs a little more, that is, 50,000 Euros to crack. It’s a rare sight – Privacy advocates getting a glimpse of the working of a cybersurveillance company such as Gamma International and Hacking Team. The newly exposed links to dodgy regimes call into question whether current regulations effectively preclude a private organization from selling malware and spyware technologies to any governments worldwide.
19 / Technowize Magazine / August 2015
Haute Money
World Championship of Football 2050- Robots VS Humans? Football World Cup 2050! Ever wondered the scenario football with legendary players like Messi, Ronaldo, Neymar Jr., etc., opposite to robots? Well, if researchers are to be believed, the generation needs to gear up for witnessing, the football World Cup 2050 played by robots vs. human footballers. Sounds crazy, right? But it’s true; researchers are trying to program robots, which will be able to play the matches in 2050 World Cup. Robots can perform and venture into the most unbelievable tasks, which sometimes are even beyond the human will. Nevertheless, there are plenty of issues to overcome. The main problem is that they don’t understand by themselves, instead they just follow step to step programmed commands. The researchers aim to execute their findings to produce robust and better robots that can compete against professional human players. The plan is to create a robot which does not injure a human. Robots should be collaborating with humans, understand human intentions and revert back their own intentions in a way that humans can understand easily. This would need a high amount of artificial intelligence. Researchers want to develop a mighty kicking machine, a robot that can move faster than a ball with perfect target at the goal area. 2050 here we come!
20 / Technowize Magazine / August 2015
21 / Technowize Magazine / August 2015
Haute Money
22 / Technowize Magazine / August 2015
Deep Genomics – A marvel of artificial intelligence Deep Genomics, is technique when a computer guides itself how to recognize categories of various things using a huge training data set, to predict the effects of mutation and gene edit with accuracy. Currently, CRISPR/Cas-9 is used as a gene editing system. For now, Deep Genomics is focusing at the technique, which can be used to search and filter over the mutations that effectively provide information that can help to diagnose the problem. In commercial genetics, Deep Genomics will soon enter as a promising and highly competitive market. Albeit, this technique has a limitation of key inherent. Gene mutations are liable to cause various diseases in any form, while, Deep Genomics approach is limited up to detecting mutations, which can affect the splicing process. This new technique will make a database of genetic variants for its own and predict effects on the mechanism of splicing; this will be free for non-commercial purpose. We cannot predict if Deep Genomics will push itself ahead of its time and competition, but the gene editing industry certainly seems to be gaining its own heights. A study last reported that, it is more likely to develop conditions like cancer and autism, while Deep Genomics takes the computational approach to identify the genes. The results and conclusions were published in December issue of Science Magazine. The company, Deep Genomics, was recently established by Brendan Frey. He is working at the University of Toronto as the head of Probabilistic and Statistical Inference Group. Brendan Frey happens to be the mentee of computer scientist Geoffrey Hinton, who is recognized as modern deep learning research’s founding father. Facebook’s director of AI research, Yann LeCun, who is former postdoctoral research associate in Hinton’s lab, is also on board as company’s advisor. 23 / Technowize Magazine / August 2015
Haute Money Windbots for Studying Gas Giants Jupiter, Saturn We have already explored the Mars, Moon and a bit of Pluto, how about the planets in the solar system with no surface or land at all? NASA has come up with yet another mind-blowing invention. ‘Windbots’- the geometric robots that could be easily powered by wind and explore the horizons of gas giants. The sides of this windbots can spin around and pop out as well, in case to steer itself. These windbots will harness the energy from currents of wind. Unidirectional and high speed wind could be difficult for the bot to keep aloft, but the difference in velocity and winds would provide the energy to keep the bot stable and buoyant. It took a year and $100,000 investment for the study funded by NASA to examine this possibility. This is not for the first time that we are experimenting with some semi- buoyant stuff like this. Back in 1995, NASA dropped a similar probe attached with parachute into Jupiter’s atmosphere, but it lasted for just about an hour. Saturn and Jupiter continue to remain the least explored planets of our huge solar system, the obvious reason is, they are huge gas planets with no surface to land on, and the heavy and violent windy atmosphere. Windbots are just a concept for now. NASA is yet to come up with a fix prototype about the design, structure or work of these windbots. We still don’t know if these windbots are truly doable, the concept is just a theory for now. But studies are going on far to turn the concept into real.
24 / Technowize Magazine / August 2015
25 / Technowize Magazine / August 2015
Haute Money Meet “Ozo� a VR Game Changer by Nokia Microsoft owned Nokia has made a grand comeback in the consumer market, with the new concept of virtual reality for professional filmmakers. Nokia has been working on developing an orb shaped camera on professional level, which is capable of capturing spatial audio and 360 degree video. This would speed up the process of providing everyday records into VR imagery. Nokia aims to proceed the new age of innovation in VR by supplying powerful tools to the professionals who will create marvelous experiences for people around the globe. Ozo will allow the professionals in studios to film and edit in real- time. The
26 / Technowize Magazine / August 2015
camera is built with eight integrated microphones along with eight synchronized global shutter sensors, which will be capable of recording spatial audio and three dimensional video, the content can be later published using VR headsets for example the Oculus Rift. The company is yet to reveal its final price for the camera, but shipping is expected to start this fall. Nokia is the latest high profile company to immerse in virtual reality. This latest technology invention by Nokia will help in turning day to day surroundings in the world of virtual reality for other applications and games. Last week, European Commission approved Nokia to take over Alcatel-Lucent, a French telecom company. This $16.6 billion deal will combine two largest network equipment manufacturers of the world to compete against market leaders like Huawei and Ericsson. Ozo will mark a new direction for Nokia, which pulled out in 2013 from the smart phone business, which is taken over by Microsoft.
27 / Technowize Magazine / August 2015
Technopolis
In the Lair of Luxury Gadgets Invest in this innovative, cuttingedge pieces of technology that will simplify and beautify your life. For those who love gadgets as much as we do, guess who just won race of the geeks?
28 / Technowize Magazine / August 2015
29 / Technowize Magazine / August 2015
Technopolis
30 / Technowize Magazine / August 2015
Air Force One Turntable- For A Stylish Seal Of Approval The Vinyl resurgence has been hard to miss. While the 12-inch records are clearly a societal fetishization of all things “vintage,” it is pretty clear that this hipster-ish thing of beauty isn’t going to die any soon. If you love vinyl, you don’t want to miss out on having one of these rare turntables from the Mecca of electronics – Japan. This new $79,500 Japanese turntable called TechDAS Air Force One designed by one of the principle from TechDAS is an absolute mechanical marvel. The unit is remarkably well-designed with a futuristic exterior. It has a multi-piece chassis and a platter that floats on air, and there is an optional vacuum pump to crack the record down without a spindle clamp. A sensor below the platter monitors and regulated speed, which is adjustable in 0.1 rpm steps. In a world almost overpopulated with stylish turntables, these, stands out exactly as you’d expect it to. Although $79,500 may sound like quite a lot money, but the Air Force One turntable is one that delivers a tonal quality that is pure gold. Let it whirr!
31 / Technowize Magazine / August 2015
Technopolis Bio Sensing Controller Wearing a smartwatch on one wrist and a mechanical one on the other does not look very appealing. How about the prospect of an entirely novel wearable gadget that can be worn on the same arm as a mechanical watch. A gadget that plops prettily on your elbow, or hides under your shirt or jacket? Myo (pronounced my-oh) armband from Thalmic Labs is a biosensing device controller for operating Bluetooth-equipped apparatus wirelessly via gestures. The armband is capable of sensing muscle movement through the electrical impulses in the lower arm, along with the body movements from its gyroscope, accelerometer and magnetometer. One can also use Myo for Powerpoint presentations, moving through the slides with simple hand gestures in the air. In fact, you can play air computer to move through music tracks on your laptop, wave left or right to change tracks, or make a fist to stop. The Myo app store is tinkering away with a lot of other potential uses that tickle our fancy. There’s one on the Thalmic website, where one can effortlessly pause and start a cookery video on a laptop using air gestures, while your hands are covered with ingredients. The principle is excellent. We admit, we’re sold! ($199 in black or white, from www.thalmic.com.)
32 / Technowize Magazine / August 2015
33 / Technowize Magazine / August 2015
Technopolis
34 / Technowize Magazine / August 2015
Blue Mo-Fi Headphones As with smartwatches, there’s an awful lot of headphones in the market, with more and more joining the fray every season. We admit, a lot of them are wonders that can bring music to life. One such wonder is the Mo-Fi headphones from the audiophiles’ favorite manufacturer Blue, well-known for crafting luxury headphones. It has a very eccentric design that helps you adapt them perfectly on your head in every geometric fashion. You can control to increase or decrease the tension they exert on your skill, and even cut down the level of sound leakage. Mo-Fi also has a built-in analogue amplifier, so music played from smartphones can be magnificently loud. We bet, you’re going to love it. Even after a 48 hours session, you’ll be amazed at how little ear fatigue you had! Once you start listening to music, the only possible response is going to be WOW! And WOW! It’s the ultimate uber-audiophile pair of sophistication meets the audio brilliance. WOW, again!
35 / Technowize Magazine / August 2015
Technopolis DJI Phantom 2 Vision+ Drones. Drones. Drones. Everybody is talking about drones. You cannot flip through the telly without seeing them just about everywhere, on every single channel, sitcom or show. But then again, there’s a reason they’re so popular – they’re handy and a hell lot of fun! The Phantom 2 Vision+ is a class act for photographers! The camera provides a wide-angle 1080p HD video and 14-megapixel stills in JPEG and RAW form. Even in the wind, you’ll find yourself producing astonishingly sharp and stable footage and pictures! It has 50 mintues of flying time, so this means that if you’re on a one day trip, you’re going to need an extra battery. It’s compact, and an amazing travel gear. It can easily fit into your backpack, but you’re going to need some socks or towels to cover, its delicate bits – the three-axis. This beautiful piece of precision machinery has a range of 700m, meaning it can fly directly above your head. It could also get in the way of aircraft coming in to land. But, it’s highly unlikely for the drone to collide with a passenger aircraft, and even if it does, it would be too light at 1.2 kg to cause any great problem. Just don’t be alarmed by its distinctive sound, like a swarm of angry bees!
36 / Technowize Magazine / August 2015
37 / Technowize Magazine / August 2015
Technopolis
38 / Technowize Magazine / August February 2015 2015
EnerPlex Jumpr Slate 5k EnerPlex Jumpr Slake 5k is an ultra-thin (95mm x 171mm) Filofax-sized portable power device that can keep your gadgets fully charged all day long.It’s so beautifully designed, that it could easily slip into your backpack or your jacket pocket and take minimal space. It has a 5100mAH capacity, sufficient to revive a fading tablet or a smartphone. It’s wafer-thin body and negligible weight (7 ounces) make it a perfect partner for hiking and camping. Despite its waife-like body, it has a tough, grippy exterior that feels great in hand. Its inputs and outputs include: a full-sized USB output, a built-in micro-USB cable output, a micro-USB input to recharge the Jumpr Slake 5k battery.
3939/ Technowize / Technowize Magazine Magazine/ February / August 2015
Technopolis Senturion Senturion is a luxury, one of a kind wrist-wear. For the elite, it’s a universal, wrist-worn key that can basically unlock or activate any device, from a house, car, and office lock to electronic gadgets such as gun cafes. It can be synchronized with the following models: Bentley, AMG, Maserati, Rolls Royce, Ferrari, Aston Martin, Audi, and McLaren. Senturion pretty much relives on the digital-locking technology to open and start any device. It is programmed to open all kinds of devices, although not at the same time. So, James Bond will have to wait. It’s beautifully crafted, with a stark hint of luxury made out of an intricately cut and polished meteorite, collected from a meteor shower that hit Namibia more than 100 million years ago, after traversing through space for around 4 billion years. While, the material has no inherent value, it’s eccentric, rare and redolent.
40 / Technowize Magazine / August February 2015 2015
41 / Technowize Magazine / August 2015
Technopolis
42 / Technowize Magazine / August 2015
The Impossible to Hack Turing Phone In the post-Snowden world, privacy is luxury. With that in mind, we’re turning our attention to the Turing Phone (TRI), an “impossible to hack” cellphone launched by Turing Robotics Industries. The Turing Phone has a decentralized authentication technology that enables the smartphone to verify the identity of other Turings without the requirement of a “3rd party Key center”. Due to its intricate authentication process, it created a protected communications network that is shielded from privacy intrusions and cyber-threats. The smartphone has a swish look, it’s molded from a single unit of Liquidmorphium, an alloy of zirconium, copper, aluminum, nickel and silver. Its unique shell makes it stronger than titanium or steel, protecting the body and screen from any damage when you drop it. Quite similar to Apple laptops, it also uses a magnetic charging system. The Turing Phone is based on an Android 5.0 Lollipop OS called the Turing UI. It will feature a Qualcomm Snapdragon 801 processor, a 13-megapixel cam, sensors to pick motion, humidity and light, and a biometric fingerprint scanner. It comes in three versions – 16GB, 64GB, and 128GB – ranging from $740 to $870.
Research In Motion Limited (RIM) 43 / Technowize Magazine / August 2015
Technopolis Kormaran Transforming Yacht In the market of luxury boats, we’ve found THE ONE! The Kormaran is a shape-shifting luxury yacht that can transform into six different modes, from bathing mode to flight mode. The 23-foot-boat can reach up to 44mph. Its interior is made from Boxmark Xtreme leather with teak wood accents and decking. Oh! The doors! The doors open in a Lamborghini fashion. Its price has not been revealed yet, but we bet, it’s worth every spend you spend. Splice the mainbrace! Price: TBA 2015
44 / Technowize Magazine / August 2015
45 / Technowize Magazine / August 2015
Trendsp otting
Next Avenger B Interne
But, is it too m
46 / Technowize Magazine / August 2015
t Up: Bots to Fight et Trolls
much to ask?
47 / Technowize Magazine / August 2015
Trendsp otting
Mind The Trolls “Shut up you bitch” “I am a Conservative. Therefore, I hate you.” “OP’s mom is a so fat she takes selfies in panoramic mode.”
of invisibility. It eliminated morality and ethics in any man, even the one with the strongest morals, to behave unjustly knowing that he wouldn’t be caught.
Anonymity triggers zero “We need to put these people in accountability for our actions. Anonymity affords trolls the the oven!” ability to uncloak disturbing internet behavior, torment, or Trolling has become an heckle others without having umbrella term. Deliberately the trammels of identifiable inflicting hatred, racism, cyberidentity. Online bullying goes bullying, bigotry, and misogyny back to CompuServe Forums, are few of the impolite L-servs and Yahoo Groups. discourses spewing from the Sadly, trolldom has evolved unfettered free expression that is rooted to the democratization from an ironic solo performance of the web. Back in 4th century to a barbarous group hunt B.C., Plato took upon himself to on webpages, public forums, broach the subject of anonymity underground chat rooms and and morality in his legend of the social networks for generating a penny worth of lulz. Rings of Gyges. The mythical ring gave its wearer the power
48 / Technowize Magazine / August 2015
49 / Technowize Magazine / August 2015
Trendsp otting
First Step towards Internet Erudition: Don’t Feed the Trolls Trolling has become a social problem without an obvious solution, the internet today is no more a civilized place. Just days following the death of her father Robin William, grief-stricken Zelda Williams was bullied off Instagram and Twitter after trolls descended on her accounts, posting cruel messages. A few years ago, Mountain Dew ran a Dub the Dew campaign, letting the internet decide the name for a green-apple infused soft drink. The results were so offensive, “Hitler did nothing wrong,” “Diabeetus,” “Gushing Granny” topped the online rankings, that the entire promotion needed to be shut down. In 2009, when Time Magazine decided to include 4Chan founder, Christopher Poole known as Moot, in their running for their “Top 100 Most Influential 50 / Technowize Magazine / August 2015
People”, 4Chan succeeded in rigging Time. Not only did Moot top the list, but 4Chan members arranged the next 20 names to spell out “Marblecake, also the game”. Two years ago, a major oil and gas company hired trolls to vex people who posted comments that were critical of how it was handling a major oil spill crisis. Last year, editors of the feminist website Jezebel published an open letter, pleading for a technical solution to tackle violent graphic gifs that were anonymously posted in hordes in the comments section. Two months ago, trolls urged a 21-year-old game developer to commit suicide. A few weeks ago, Reddit bullied one of the very few woman CEOs in tech out of her job. In short, vitriolic online interjections,
cyber bullying that is, in all forms narcissistic, machiavellian, psychopathic, and sadistic – for people who don’t have any other emotional outlet is soaring and something needs to be done about it. Stat! If we can’t get enough Zoey Deschannel clones to hug anonymous trolls and get the trolling out of them, we’re gonna have to find some other way to moderate it. Perhaps, a new technology to protect us from trolls who like testing the boundaries of common decency. Large companies with enough gold in their coffers take refuge in disemvoweling and outsourcing content moderation to intercept comments at the expense of emotional and mental toll of their moderators. But, it’s a tough life being an Internet Avenger, and yes it’s tough even
without the spandex suits. We’re going to need something bigger and better to weed out this kind of sadder, revolting subjects that revolve around obscenities and graphic nudity, instead of simply getting used to the trolls. That says, what if we could have clever bots doing all the dirty deeds? What if, we created a computer smart enough to identify and halt online abuse faster before the repercussions take a toll on anybody? At SRI International (SpinoffCity), the Silicon Valley incubator where Apple’s Siri virtual personal assistant was invented, researchers believe they’ve developed bizzaro algorithms that can identify and remove the vile tirades of abuses. 51 / Technowize Magazine / August 2015
Trendsp otting
52 / Technowize Magazine / August 2015
Winning the War against Trolls A few years ago Normal Winarsky, president at SRI Ventures, was at TED, where he noticed that a great number of discussions took place around cyberbullying. Back at SRI, his team started scouting out ideas to heckle bullying for a major social network on its platform. The social network had stockpiled a wealth of data sets and reports on cyberbullying and offered them to SRI to see if its researchers could do anything to help bridle the problem. “Social networks are overwhelmed with these kinds of problems, and human curators can’t manage the load,” says Normal Winarsky, president of SRI Ventures. Researchers at SRI used some of their own well-developed Artificial Intelligence algorithms to apply them against the bullying data received from the social network. The results were widely successful than expected, given the complexity of the problem. SRI has built an AI with a deep understanding of how people communicate online to gain a wealth of experience and cut down cyber bullying. The Artificial Intelligence has already generated a wealth of experience, and can grade the quality of essays in standardized tests. Developing the anti-bullying technology took about 250 people combing through gigabytes of data that the social network provided. The data included instances of bullying that human curators had already identified. Researchers at SRI fed that data into machine learning systems that began to learn and duplicate the job of human content moderation.
The more pressing problem is that bullying can be subtle and the content can be difficult to understand. It’s tough teaching a machine to analyze something that complex, to parse the real meaning behind even the most innocuous looking words. SRI’s AI system is designed to understand the real meaning behind a post, identify attacks by analyzing patterns of actions, in the exact same way a cybersecurity algorithm does to recognize the nature of attack on a server. SRI is building a semi-automated system that can easily detect the likelihood of abuses and flag bullying with a high rate of accuracy using a combination of natural language processing, machine learning and statistical approaches. In the future, as it further improves, it should be able to lessen the burden off human curators who have to manually intercept to determine if a troll is bullying or not. The team at SRI could apply these algorithms in creating a bot that can comb social networks for perhaps even seedier activities, such as terrorist recruiting propaganda. For all one knows, it could someday assist law enforcement agencies to counter- ISIS and similar such terrorist organizations’ recruiters who deploy savvy online appeals to youngsters in their recruitment efforts. The initial working prototype of the AI system will be ready for real world application in six to twelve months from now. While, the polished version could take a little longer. SRI will be licensing the technology to social networks, companies, and political parties, if they need it. 53 / Technowize Magazine / August 2015
Trendsp otting
54 / Technowize Magazine / August 2015
Tech Companies Structure the Dysfunction Clement Farabet founder of Madbits, an AI company later snapped up by Twitter in 2014, has built a brain-like computing system that can automatically identify NSFW photos and videos on Twitter. The AI system can identify porn with 99 percent accuracy, allowing Twitter to warn users with interstitials in the Twitter timeline. This new breed of AI developed by companies like Madbits and WhetLab (another machine-learning startup), can help social networks comb through a stream of posts that include wildly inappropriate images, porn, gore, sexual solicitation, and racism, much faster and cheaper. Ramping up its AI efforts in last twelve months, Twitter has built Twitter Cortex for automatic content understanding. Like Twitter, Facebook and Google have teams dedicated to deep-learning, to build a breed of computing system that can emulate the web of neurons in the human brain. Facebook uses these “neutral networks” to identify faces in photos. These deep learning algorithms can execute certain tasks, such as, analyze movie dialogues. These kinds of algorithms are far too inexperienced to identify something like porn, especially when there’s a horde of images and videos of naked baby and breast-feeding mothers. The same is the case with isitnude.com, a nudity detection tool that can help identify and weed out nudity and color photographs. Developed by Algorithmia,
a marketplace for Algorithms, the tool when fed with an image, tells you if that anyone in that image is wearing little to no clothing. The algorithm is built by combining skin color detection and image detection algorithms developed by Algorithmia to identify nudity. It uses skin color distribution model and scans the image to join patches of detected skin. If the Algorithm detects large portions of image as skin, it marks the image as having nudity. In addition, face detection algorithm is used to find multiple people to help prevent false positives, as well as to figure out the skin tone ranges it needs to look for in an image. Since the algorithm is based purely on skin, innocent beach pics might get flagged too. The machines will need to distinguish between depictions of nudity in artwork and NSFW posts. Just a few weeks ago, the new Google Photo app, Google’s neutral networks identified black people as gorillas. A sign that machines are far from perfect in distinguishing accurately. These kind of issues will eventually be spelled out. Bearing in mind that more than 100,000 people worldwide spend their days identifying NSFW content, it would be a tremendous time-save for media sites, social networks, governments trying to clear out offensive images from internet forums and comments sections. In an online world where dominance plays, a more sophisticated version of these AI system will give a foothold to stand on.
55 / Technowize Magazine / August 2015
COVE R S TO RY
Transmutation Technology: Robotic Survival Instinct 56 / Technowize Magazine / August 2015
Harnessing the Power of Evolution
“
Human evolution has directed us into the future. Can we say the same about machines?
We humans are strange creatures. Our species began to evolve nearly 6 million years ago, when we started walking upright to survive in the diverse habitats near where we lived, including grasslands and forests. About 800,000 years ago the control of fire brought a fundamental change in the human diet, how we socialized around campfires to find comfort and warmth, to share information and food and to find safety from predators. Between 800,000 and 200,000 years ago the human brain size rapidly evolved during a dramatic period of climate change. A larger and more complex brain enabled humans to interact with each other and with their surroundings in a new and different way. As the environment became more arbitrary, bigger brains helped our ancestors survive. The turning point was 12,000 years ago when humans eventually found they could control the growth and breeding of certain plants and animals. This revelation led to farming and herding animals, activities that transformed Earth’s natura landscapes. But, the biggest of all in the timeline of evolution is a biological enigma - it is the evolution of adaptive immunity. Within a given population, those who with better predictive skills can survive any kind of attack or dangerous situation. Naturally, over time, it is these people with specific genes and abilities that tend to survive and pass on those genes that allows a superior offspring to survive. From this obvious premise, human evolution has directed us into the future.
“
57 / Technowize Magazine / August 2015
COVE R S TO RY
58 / Technowize Magazine / August 2015
“
Evolutionary
Can we say the same about machines? The answer is Algorithms most certainly yes. As a matter of fact, is it very likely that with the help of evolutionary computation, we will enter a are written in new phase where Evolutionary Algorithms (EAs) that take place in hardware are developed, paving the way for new a way that a avenues towards autonomous machines that can adapt to programmatically their environment. In the fascinating branch of computational science, generated Evolutionary Algorithms (EAs) are inspired by the biological model of evolution and the theory of natural solution can be selection laid down by Charles Darwin in 1859. When a) tested for Artificial Intelligence was still in its embryonic stages, researchers hope that it would usher in a new age of fitness and b) time saving machines which would someday take over dull and dangerous human tasks. Very quickly, it became slightly mutated. apparent that although the technology was able to perform simpler tasks, complex tasks were something beyond its capabilities. If nature used evolution to create something as intricately complex as the human brain, can we use evolution to build it again, but for machines this time? Evolutionary Algorithms are written in a way that a programmatically generated solution can be a) tested for fitness and b) slightly mutated. The end goal is to keep on testing permutations to find the best solution rather than a programmer having to know the best solution ahead of time. EA can be applied in advanced Artificial Intelligence. The objective of EA is that in the nascent field of deep learning, it helps hand-pick sophisticated machine learning algorithms that are far better than many of its progenitors in its abilities to recognize images and syllables, flexibly adapt to injuries, etc.
“
59 / Technowize Magazine / August 2015
COVE R S TO RY
Evolutionary Algorithms: Robots with Instincts 60 / Technowize Magazine / August 2015
“
The only problem with
Implications of the Algorithm
evolutionary computation
The only problem with evolutionary computation is that is that while while we’ve had a whole life to figure out how to adapt we’ve had in a certain condition, not to mention millions of years of evolution, machines do not have any at all. It’s something a whole life that Jean-Baptiste Mouret, a researcher at Sorbonne University and a team of fellow scientists are trying to solve. to figure out In May 2015, the group appeared in Nature magazine, how to adapt presenting an algorithm that could possibly help robots develop a sense of instincts, an edge of adaptiveness. in a certain When it comes to humans, if something is broken, we look into some sort of diagnosis to know what is wrong, and condition, then try to find a solution for it. When it comes to robots, machines do this happens in the form of patterns embedded into the system or when they figure it out by themselves. not have any Researchers at Cornell University recently developed a four-legged “starfish” robot that could easily identify its at all. own parts and adapt to changes accordingly. Mouret’s team believes that robots could adapt through trial and error, without having to understand what is going on. Through a combination of evolutionary algorithms, the team will teach the robot about what its own body can do first when it has an ill-functioning limb. For this study, once the group developed and customized a robot, the algorithm classified its potential scope of the conduct, the robot could possibly move in every single way, and recognized the best alternatives. It’s “a touch like a kid who is attempting various things with its own
“
61 / Technowize Magazine / August 2015
COVE R S TO RY
62 / Technowize Magazine / August 2015
“
particular body, just to know itself,” says Mouret. When It’s the robot was sent into the field, it had an arrangement of the fundamental instincts based on its undamaged body. exceptionally If it got hurt, it could simply use that learning as a jumpingoff point to test the rest alternatives. “These intuitions are wrong most of the time,” says Mouret. “The robot does not hard to trust them but says ‘let’s try this thing, because we have intuition that might work.” imagine how Once it’s begun this procedure, the robot utilizes a mathematical model called Bayesian optimization to blind the locate another technique. A robot, for instance, may start by understanding that its normal walking style is presently robots are. sending it in circles — scientists have deactivated one of the legs. It combs through its existing learning base of around 13,000 walks, picks a possible arrangement, and tests it, while the sensors measure its pace and direction. At that point, it proceeds onward to the following alternative, adjusting its “intuition” with more arbitrary decisions that could uncover a new path. Once it’s 90 percent certain that it’s discovered the quickest and straightest alternative, it returns to work. It doesn’t fully understand what is broken. It just knows that something is not as expected and after that tries to discover something that works in spite of the damage. The group of researchers tried this algorithm on two robots: a six-legged walking bot and a multi-jointed, gyratory arm that was having a go to drop a ping-pong ball into a cup. They tried five unique methods for breaking the hexapod, including mostly disjoining one leg, removing two, and attempting an ersatz repair. After being run through each of these scenarios 40 times, the robot took around a moment to adjust to a new walk. The robotic
“
63 / Technowize Magazine / August 2015
COVE R S TO RY
64 / Technowize Magazine / August 2015
“ An
undamaged
arm, in the meantime, had individual joints either broken or stuck somewhere; it adjusted steadily in less than two walking robot, minutes and typically under 30 seconds. for instance, Although, the model has its limits. For two of the 14 mechanical arm errors they tried, for instance, the group’s could utilize algorithm didn’t perform any better than conventional, non-”instinctive” experimentation. The group estimates the algorithm that if the harm is sufficiently awful, the robot’s body can to make change so much that its past learning becomes futile. Similarly, if a robot’s sensors — not simply its add-ons sense of how — are damaged, it won’t have the capacity to get enough accurate data to adjust by any stretch of the imagination. to navigate What’s more, at this moment, it just reacts to genuinely a particularly straightforward objectives. At the point when people and creatures limp, for instance, they’re not simply attempting difficult to locate another approach to walk, they’re abstaining from harming themselves any more. We cannot say the terrain. same for robots; they simply appear to be quicker or more precise. It’s exceptionally hard to imagine how blind the robots are. While, we humans have skin and internal organs that send sensory information. Yet, robots for the most part have only a couple of sensors. Partly as a result of this, the robots barely know anything about what’s going ahead outside their own bodies. So if they’re on patchy terrain, or in a little, congested space, they can’t consider that their experimentation. The following step is to redress this, testing more entangled robots with a more extensive scope of movement and more methods for looking at the world around them. This system could be adjusted effectively to existing robots, especially advanced humanoid ones like the rivals in DARPA’s Robotics Challenge. “All these robots
“
65 / Technowize Magazine / August 2015
COVE R S TO RY
66 / Technowize Magazine / August 2015
“
The algorithm
are very versatile,” he says. If one part breaks, they’ve got created by a lot of ways to compensate, just like humans or animals. The more stripped-down and specific a machine gets, the Mouret could less useful the algorithm becomes. “If you take a Roomba — the vacuum cleaner — this robot has only two wheels. help scale So if one wheel is broken, maybe it can do something. up machines If two are broken, it cannot do anything,” says Mouret. “So it could be used, but it would not be that interesting.” used in space Obviously, it can be pretty much as imperative for flexible systems like an aircraft to react to damage. Researchers exploration, at NASA, for instance, are trying a flight control system with its own particular intelligent adaptive system. disaster In theory, helping robots make sense of what they relief and oil can do and afterward instructing them to accomplish a particular objective could have applications past adjusting drilling. to damages and injuries. An undamaged walking robot, for instance, could utilize the algorithm to make sense of how to navigate a particularly difficult terrain. Yet, these are auxiliary alternatives. Engineers just can’t anticipate everything that may turn out badly with their creations. An algorithm of this sort could be utilized to enhance robots and to improve them perform. This kind of pre-programmed robots are regularly used for disaster relief. However, these intelligent machines lack “instincts” to recover from injuries, thus rendering them as ineffective. The algorithm created by Mouret could help scale up machines used in space exploration, disaster relief and oil drilling. The embedded patterns, equivalent of innate knowledge, could help robots overcome a myriad of situational problems accomplish their objectives.
“
67 / Technowize Magazine / August 2015
Hardware, inc.
A Walk through the Data Centre that Powers World’s Largest Search Engine In May 2015, Google was ranked first amongst the most visited multi-platform web properties in the United States with 242 million U.S. unique visitors and a market share of 64.2 percent among the leading U.S search engine providers. Some of these facts and figures below will make you love Google even more that you probably did!
50 Petabytes is the entire written works of the mankind from the beginning of the recorded history in all languages 20 Petabytes of Information is processed daily Google has 2.5 billion users, making it by far the largest social network 620 000 000 daily visitors to Google Amount of monthly Google searches: 11.944 billion It’s no wonder Google requires massive storage infrastructure in every continent to house its ginormous stockpile of platform services! Google has spread its data center infrastructure all over the world, with 6 in North America. Google’s data centers consume 260 million watts of power, this is enough to power 200,000 average homes. In recent years, Google has started reducing its carbon footprints with clean-energy data centers. Only recently, the search engine giant took the curtains off the Google data center campus in Lenoir, North Carolina. (Source: http://www.statista.com) (Promodo)Picture: Google 68 / Technowize Magazine / August 2015
1 The Lenoir, North Carolina Facility at night Picture: Google 69 / Technowize Magazine / August 2015
Hardware, inc.
Server racks with color coded cables. Picture: Google 70 / Technowize Magazine / August 2015
Patrick Davillier does a visual inspection of the water pipes running below the floor. Picture: Google
Inside Google’s Lenoir Data Center Facility Servers normally get jammed into closets, but then again, this is small businesses we’re talking about. When you’re operating on the scale of companies as large as Microsoft, Google, Facebook, you’d probably need a gigantic building to house servers. Unarguably, it’s crucial to their success, i.e. the ability to build, organization and operate a massive network of servers and fiber-optic cables with an incredible efficiency and speed. The data center infrastructure alone can cost up to $30 million! Not so long ago, the 14-year-old search giant opened
the doors to its Lenoir, North Carolina facility, a multi-million dollar infrastructure that is the god almighty of all clouds. It allows Google to index 20 billion web pages per day, handle more than 3 billion daily search queries, provide free storage to 420 million Gmail users, provide access to millions of YouTube videos, and handle millions of ad auctions in real time. In the near future, when Glass becomes publicly available, the giant infrastructure will power its visual queries. Phew! Quite a lot you say?
Picture: Google 71 / Technowize Magazine / August 2015
Hardware, inc.
Denise Harwood diagnoses an overheated CPU Picture: Google
Data Centre As One Giant Computer Google has long been building its own network hardware and software to connect all of the servers in its data centers together, powering the most powerful computing and storage systems on the planet. Six years ago, at the Efficient Data Center Summit, Google announced its Power Usage Effectiveness (PUE) results and shed light on some of its techniques. Today, iconic IT companies like Facebook and Yahoo are following its footsteps by report similar PUEs. Alongside being the world’s biggest search engine, 72 / Technowize Magazine / August 2015
Google has also grown its tentacles becoming the world’s largest hardware manufacturers. While companies like Dell, HP, and IBM are buying servers, Google designs and builds its own servers. In 2009, at the EDC Summit, Ben Jai who has designed many of Google’s servers pulled the curtains off a modern Google server created for a technically sophisticated audience. Google believes in not buying unnecessary extras – graphic cards, enclosures, and so it started applying the same principle to its networking equipment that it began building a few years ago.
Blue LEDs on the row of servers tell Google that everything is running smoothly. Picture: Google
73 / Technowize Magazine / August 2015
Hardware, inc.
The Campus Network Room Picture: Google 74 / Technowize Magazine / August 2015
The only arena that Google hasn’t ventured into is building its own chips. Who knows, the tech giant will probably cross this off its TO DO list by 2020! Building your own equipment does not yield much, if one cannot bring out all the bits to customers speedily and unfailingly. To achieve this, Google attempted, a few years ago by buying abandoned fiber-optic networks. Today, through a torrent of acquisitions, it has become home to the biggest glass empire on the planet. To meet growing demands of users browsing videos, putting search queries, emailing each other consistently, Google has installed its own server racks – mini data centers – connected directly to ISPs such as AT&T and Comcast in various bases of its network where it stuff popular videos. This means that when you’re looking for a popular video, you aren’t getting it from Lenoir, but from a mini data center, probably a few miles away from where you are. Amazing, isn’t it? In the past few years, Google has also built a software system to manage its countless servers. In-house
developers command thousands of computers to perform tasks. In 2012, Google’s data scientists created Google File System, a program that can efficiently dispense files across countless machines. Another Google system, MapReduce, for writing cloud-based applications turned out to be so popular that an open source version – Hadoop – became an industry standard. Google has also created several softwares to tackle issues in day-to-day data operations. But, the BIG question is, when a load of tasks comes pouring into the center, how does Google determine instantly and efficiently which machines can best afford to take the load? The answer is “loadbalancing,” with an automated system Borg. These kind of innovations helps Google fulfill an idea exemplified in a 2009 paper written by Hölzle and a fellow computer scientist Luiz Barroso, “The computing platform of interest no longer resembles a pizza box or a refrigerator, but a warehouse full of computers. We must treat the data-center itself as one massive warehouse-scale computer.”
Inside Lenoir’s campus network room. Picture: Google 75 / Technowize Magazine / August 2015
Hardware, inc.
The Council Bluffs data center that provides over 115,000 square feet of space. Picture: Google
A Tour Of Lenoir Facility While one can watch a guided tour of a Google data center on Google, walking through the facility that is typically shrouded in secrecy is something that only a few lucky outsiders have experienced. As you walk through the business offices, you realize that this data center follows the NASCAR theme. The control 1 The Lenoir, North Carolina Facility at night room is decked with LCD dashboards that monitor metrics, on the catwalks support giant cooling towers and backup electric generators. The floor is decked, row after row with server racks 76 / Technowize Magazine / August 2015
that seem to stretch to eternity. But, what’s eerily interesting is Google’s idea behind the cold aisles and hot aisles. The cold aisle refers to the general room temperature, i.e. a sweltering 77 degrees. The hot aisle is the narrow space between the backsides of two server rows that are tightly enclosed by sheet metal on the ends. Copper coils emulating a nest absorb the heat. Above these aisles are massive fans, jacked through Marshall amps. As you walk between the server rows, you realize that
1 The Lenoir, North Carolina Facility at night Picture: Google 77 / Technowize Magazine / August 2015
Hardware, inc.
1 The Lenoir, North Carolina Facility at night Picture: Google 78 / Technowize Magazine / August 2015
there’s only cables and plugs in the front, so no one can crack open the sheet metal and get access to the hot aisle, where obviously, they’ll only be barbecued to death. When Googlers need to head there, the hot aisle, the servers are shut down. Every server in the data center has a sticker with a code that identifies its exact address, in case something goes wrong. The servers have thick black batteries on the side. Everything in the data center is uniform, and spunkier than one might expect. What remains a mystery is what the blue twinkling lights indicate. It could be anything – a web search query by someone in South Korea, a new Gmail message for a user in Sweden or Australia, a calendar invite by a user in London. What no one at the massive data center mentions is that every so often a Googler will appear on a motorized scooter or, a dude pushing a cart with a laptop on top providing repair parts to servers like a nurse handing out medicines. Interesting fact: There’s an area on the floor that holds the replacement gear called pharmacy. So, how many servers does Google have? Ever since the search engine giant built its first data center, it has
stuck to “hundreds of thousands”. What we do know now is that there are around 50,000 servers operating in the Lenoir facility. If you want to catch a glimpse of servers designed by Google, the secure area is the place to be. It’s decked with rows of motherboards mounted to the wall, reminiscing of the Hollywood walk of fame. What will catch your attention is a tiny embossed plague sitting on top that read July 9, 2008, its Google’s millionth server. While it’s more of a cumulative number, and does not necessarily mean that Google employees a million servers at once. Even if Google does employ a million servers at once, it’s sort of meaningless. Today’s machines are twice more powerful than those from a previous generation. Hölzle believes that an individual server can mean nothing. At Google, computer power is an abstract metric. In the future, Google might bring some huge changes in the data center in terms of cluster design, speed of deployment and flexibility. Google is dedicated to providing access to information all over the world, but when it comes to divulging information on its future plans, it keeps some to itself.
1 The Lenoir, North Carolina Facility at night
Picture: Google 79 / Technowize Magazine / August 2015
Hardware, inc.
Wildflowers bloom around cooling towers at our Iowa data center. Picture: Google
Interesting Tidbits You May Not Have Known about Google’s Data Servers Only a small percentage of Google employees are authorized to enter a data center campus. The data center campus has a foosball table. Googlers use motorized scooters to travel across the massive building. The data1center temperature a scorching 80 at night The Lenoir, North is Carolina Facility degrees. Server racks are custom-designed and built at Google. According to a Googler, recently Google just “went 80 / Technowize Magazine / August 2015
past the 3-million man-hour mark for zero loss-time. Three million man hours is a really long time and with the number of people we have on site that is an amazing accomplishment.” The data center campuses’ security includes biometric iris scanners, badges, and “under-floor intrusion detection via laser beams.” When drives fail “they are brought to an ultra-secure cage where they are erased and crushed if necessary.”
Water storage tanks and cooling towers Picture: Google
81 / Technowize Magazine / August 2015
82 / Technowize Magazine / August 2015
DIARY OF A
TECHNOPRENEUR The future of computing is Cloud Computing. Jamie Miller CIO of General Electric, reveals its plans to power its infrastructure and technology for a “new” future global economy.
Jamie Miller heads information technology for a 123-year-old company that is transforming itself to thrive in the digital economy: General Electric. A few weeks ago, Miller shared interesting views on how General Electric is sing cloud computing, big data analytics, and mobility to usher changes in its operating landscape.
CLOUD COMPUTING
Jamie Miller believed that in today’s “Mobile First, Cloud First,” age what major corporations really need to focus on is four key areas: cloud, data as a service, manufacturing and field services. Together, they can help drive better outcomes and higher quality for customers, and speed and productivity for the organization. By 2020, Miller expects to run 70 percent of the organizations applications in a cloud domain. By leveraging “as a service” software and infrastructure, the company aims to move out of the manufacturing business and into the assembly business so to speak. By embracing cloud-based solution, GE holes to significantly reduce its data centers, thus reducing 10-40 percent of its cost.
THE CONVERGENCE OF IT & OPERATIONAL TECHNOLOGY
When it comes to operationalizing the IT/OT convergence, manufacturing is on top of things. To leverage on this, GE has been transforming its 400 factories into “Brilliant Factories”. The Brilliant Factory digitally integrates engineering and manufacturing design, leverages data to run its factories much more productively and optimizes the entire supply chain in novel ways. Embedded sensors provide visibility into how equipment is performing and how to optimize production and 83 / Technowize Magazine / August 2015
84 / Technowize Magazine / August 2015
material logistics real-time. With Brilliant Factories, GE can increase machine uptime and predict maintenance before it is needed. Analytics predicts the dangers of late delivery by suppliers so that companies can adjust the entire production schedule before it creates a problem. These sensors are utilized for insight into the physical process to make it better as well as providing the critical data for engineering models. For example, GE’s Power & Water and Transportation businesses have seen a 10-25 percent increments in machine uptime – think efficiency.
LEVERAGING ON DATA AS A SERVICE
The whole focus of the Industrial Internet is to drive better outcomes for General Electric customers. Data as a Service is how the multinational conglomerate drives outcomes from data inside GE. Wielding its Predix platform and data lake technology, it can harvest large sets of disparate data in ways it never could before, and at cost points that were previously unimaginable. At the heart of GE’s efforts is an outcomes-first approach: start with the outcome, define the decision process, and then drive back into the data. General Electric has been laser-focused and it’s yielding results. By leveraging machine learning and analytical algorithms, GE has cleansed and analyzed data sets across the entire GE industrial direct materials sourcing buy (all $40 billion worth). GE is driving new levels of transparency and negotiation with its suppliers as a result. It was able to do this in a few months, not years. Imagine how quickly if can drive acquisition synergies with this capability. General Electric is also using Data as a Service to drive new ways of thinking in GE, solving problems in manufacturing, logistics and product quality. Miller believes, they’re just getting started.
MAKING WAY FOR PREDICTIVE FIELD SERVICE
Field service is one of the most important places GE engages with its customers. For GE clients, more machine uptime can mean billions of dollars of productivity in their operations. General Electric has worked with its customers to drive astonishing results. For example, GE has a solution called “Smart Outage”, which is a mobile collaboration tool designed for its field engineers in its services businesses. Smart Outages provides real-time information, so that when the engineers are out on a rig, repairing some kind of heavy equipment, they have a way to connect back to the team at the base and collaborate with an expert. General Electric is also leveraging on machine data and algorithms to predict how to best maintain and optimize equipment performance for its customers. This means GE can fix things before they break and monitor assets remotely and in real-time. GE aims to make the life of GE service engineer completely mobile, and a digital experience. Moving from a reactive to a predictive field service management model is expected to result in significant productivity gains. In order to drive these outcomes, GE needed a modular digital backbone that was connected by a single platform. That’s why it developed Predix. Now GE can connect people with products and process and seeing growth for its customers and across GE. It works with integrated teams (software, IT, engineering) to bring these outcomes to life. 85 / Technowize Magazine / August 2015
F uturist
86 / Technowize Magazine / August 2015
Climbing high into the sun Google’s Makani project illustrates, there’s no single magic bullet to accelerate the shift to clean, renewable energy on a planetary scale.
87 / Technowize Magazine / August 2015
F uturist
88 / Technowize Magazine / August 2015
For years now, Google has been making large bets on solving one of the major issues of the 21st century - to create clean energy for the planet. In 2013, the Tech Goliath acquired Makani Power, and ever since then it has been working on flying wind turbines! Sounds ambitious? Not so much! Makani Power is a green energy startup that was acquired by Google two years ago, specifically for its project on Google X skunk works. In April 2015, Google X head, Astro Teller, announced a full scale airborne model of wind turbine. Come July, and we know that Google has filed patents on project Makani. The patents elaborate methods for optimizing generation of electricity in a wind turbine to be airborne. Google has already taken a large chunk out of its wallet, worth US $168 million, for a solar power tower plant in California, and now it has turned to wind power. The power acquisition, Makani, comes from Google X, it’s research and development branch that concentrates on high end technologies, such as Google Glass and Google Car ‘driverless’. Apparently this is the first time when Google acquired a company for Google X, but this is not the first time that it is investing in wind power.
89 / Technowize Magazine / August 2015
F uturist
90 / Technowize Magazine / August 2015
Few projects at Google X: 1. Self-driving car: A moonshot project by Google X Lab, which involves technologies to develop driverless cars. The project is headed by Google engineer, the director of the Stanford Artificial Intelligence Laboratory, Sebastian Thrun. 2. Life science division: It deals with the various ranges of projects at the life science division of Google X. So far, it has introduced the Google Contact Lens, Liftware Spoon, a unique Baseline Study, a disease-detecting nanoparticle platform, and a health-tracking wristband. 3. Project glass: Google Glass? The hottest thing in wearable tech? 4. Project Loon: Bringing internet connectivity globally by making an internet network of balloons flying across stratosphere. Back in 2006, as a primary investor, Google funded $10 million to Makani power, followed by another $5 million in the same year. In 2010, the Department of Energy’s Advanced Research Projects Agency (ARPA-E), helped Makani Power in developing the prototype of Wing 7, the 30 kW scale model of Makani’s other 600 kW devices, utility scaled designed to fly at altitudes between 250 m – 600 m (800 ft and 1,950 ft) and electricity transmitted to ground through a tether.
91 / Technowize Magazine / August 2015
F uturist
92 / Technowize Magazine / August 2015
The Inner Workings of Makani Flying Turbines The wings are tethered and fitted with turbines that work like wind turbines that are conventional, with air passing across the blades forcing them to rotate and produce electricity through a generator. Makani explains this will provide high performance in low winds, less requirement of building materials, and this allows the turbines to produce the power twice as much as that of a traditional wind turbine of same size. Makani also states, this project will be economically helpful in areas where conventional wind turbines are not. The technology to run these wind turbines will be slightly cheaper as compared to the conventional ones in good wind areas, further their energy cost will be half of conventional turbines in both offshore and onshore conditions. The Airborne Wind Turbines are to be installed over large areas in arrays, with a circular flying path and a tethered length apart to prevent it from bending. Makani recently completed the first autonomous flight demonstrations, it demonstrated all flight modes, which included launching, soaring and landing. It further stated that the extra resources provided to them through, the deal will help them in accelerating the technology development with the goal of making wind energy competitive with fossil fuels. If the prototype works as per as planned, it will speed up the move of world towards renewable sources of energy. Google has been experimenting with flying its 28 foot models, in California, because wind’s speed and direction can change dramatically within fractions of time. Despite the tough and harsh conditions, Google was not able to crash a Makani kite, even after flying for more than 100 hours, albeit it seems that it is not a good thing for Google. If, Google fails in an experiment, the failure allows it to learn new things and improve its effort on the projects. Google CEO, Larry Page, wanted at least five kites to crash, but none of them did, so now the company is testing onto the full scale model.
93 / Technowize Magazine / August 2015
F uturist
94 / Technowize Magazine / August 2015
This unconventional method of generating renewable energy actually crosses many hurdles that hover around the theory of power generation by winds. The onshore wind turbines require a huge quantity of concrete and steel for construction. According to a study, almost 100 tons of different materials, mainly steel, concrete and fiberglass on an average will generate 1 MW of energy, which can be easily used to power around 500 US homes. The huge structures are far too expensive to construct and very hard and complicating for installing purpose. Secondly, in order to function in an optimal way, wind turbines must be situated in areas which have a higher wind velocity, which could be 5 m/Sec to 8 m/Sec. It’s a harsh luck, hardly 15% of land around the Earth is qualified for such conditions, and therefore, at some instance of time, wind power generation from onshore will be out of sight. At high altitudes, there are no such boundaries, and here Makani kites are able to produce 50% extra energy by accessing the higher velocity winds at heights.The kite barely uses 10% of materials that is needed for a conventional wind turbine onshore, all thanks to recent inventions of technologies. A bird eye view of the project: The kite system of Makani is divided into four different parts. 1. Flying wind tunnel 2. Tether 3. Ground station 4. Computer The turbine remains on the ground station until the wind is favorable for power generation. As soon as the wind becomes favorable for power
95 / Technowize Magazine / August 2015
F uturist
96 / Technowize Magazine / August 2015
generation, the rotors of the flying turbines start working under various wind conditions, thus generating electricity. The generated electricity from the rotor of the wind turbine is hence transmitted to the following ground station with the help of tether. While the wind turbine is soaring, the computer will guide it to optimize the generation of electricity. Major Pitfalls We have come across terms like power output, threshold point and rated wind speed. Each kite possesses its own maximum output power and it is described as rated power output.The speed of the wind at which rated power output is achieved is known as rated wind speed.The threshold level is a mark where generation of the electricity takes place at its maximum peak. Makani’s kites work under conditions in which, speed of the wind keeps changing continuously at a great instance of time.The increase in wind speed helps in generation of electricity as it leads to a high and increased power output. The same phenomenon is responsible for intense heat production as well. This draws out boundaries of operational parameters of a wind turbine which is airborne as the part of electricity starts losing itself to heat.In order to hike the efficiency of electricity generation, it is considered very important to keep the regular checks and lighten the heat production. What could be the possible solutions? The most important solution is effective power generation management. The patents filed by Google are doing exactly the same thing. The patents address the two power control methods for rotors of the wind turbine. Among the two strategies, the first gives the priority to power generation, and the other gives the priority to heat control. Both the control schemes are employed as per its dependency on the power generating station. Computers have become more powerful and smaller, on the other hand, carbon fiber has become mightier, light and less expensive. These inventions replace tons of concrete and steel with compact and lightweight software, electronic items and advanced materials. – Makani website
97 / Technowize Magazine / August 2015
App Labs A Spin with Augmented Reality Featuring Top Augmented Reality Apps for Android and iOS
98 / Technowize Magazine / August 2015
In Augmented Reality, these days, it’s a feast or a famine. According to a new market research, the Augmented Reality Technology (ART) market is expected to reach $7 billion by 2018. While, the ever fast growing video game market is expected to reach $111 billion in 2016, making VRT one tempting place for the investors and tech aficionados. You would agree. This is a subject that clamors for the passion it deserves. Especially from connoisseurs whose enthusiasm for AR is self-
explanatory. After all, how is one going to make the most of their weekend with the brotherhood ritual that calls for wolfing down a bowl full of meatball spaghetti in one sitting, a bit of harmless Redditbait, and a plenty of fun and games with an augmented reality headset strapped on. It makes sense, the augmented reality scene has volcanically exploded in recent years, with the proliferation of AR headsets and impressive apps. The only problem is that there are just too many of them.
Even with Editor’s Picks to help you out with your downloading decision, it’s still a gnarly task finding the best apps around. With best intentions in mind, we’ve rounded up a list of the seven best apps for your Android and iOS devices. These apps are going to rejig augmented reality functionality, offering something so exciting that it becomes one of the must-have apps that has to be downloaded for your augmented reality headset. So, dip in your cash for one of these apps, trust us, it is a worthwhile purchase.
99 / Technowize Magazine / August 2015
App Labs
Wikitude (Price: FREE) Wikitude is a mobile augmented reality technology that allows you to see more than your eyes could capture! It is a unique hybrid of a J.K. Rowling, J. R.R. Tolkien world and a computerized vision that connects you with the world in a completely new way. Wikitude allows you to build an AR world of your own, by joining together different search options. For example, you want to check on all the tweets that have been posted near The Bronx, New York and all the Wikipedia points of interest, its helps you merge it and create your own world. This way, you can check out a zillion places! Moreover, this app can be used to experience visual reality content, projects, campaigns, promotions, magazines, newspapers, games, packaging etc. by scanning the things you see! It also brings print media to life with augmented contents like 3D models, animations, and videos. 100 / Technowize Magazine / August 2015
101 101/ Technowize / Technowize Magazine Magazine/ February / August 2015
App Labs Anatomy 4D (Price: FREE) Anatony 4D is an app that transports anyone who wants to learn about the human body, into a 4D world, and learn and explore the human anatomy in brief. To get started, all you’ve got to do is, print any of the images from the “target Library” in the app, and place it on a flat surface. Next, you need to scan the image with your AR headset and watch the image come to life. The outcome is visually stunning and completely immersive, once has to simply zoom in to experience a body part to explore it in intricate detail. It can be used by students, teachers, medical professionals and pretty much anyone who wants to learn about the human anatomy. We’ve crowned this pretty little innovation the app for 21st-century education.
102 / Technowize Magazine / August 2015
myNav (Price: $1.99) myNav is a premium iOS app for locating your parked vehicle. All you need to do is tag the place and enter the search option. The app records the duration of your parked vehicle and calculates the distance between you and the parked vehicle. This app is so useful in over-crowded parking lots during gatherings, concerts, and shows, etc. It consists of radar compass and distance gauge that one can use with the help of AR headsets to experience an AR navigation. Moreover, it takes notes and pictures of the tagged place, offers a GPS accuracy ring and retina display optimization to make it a visually immersive experience.
103 / Technowize Magazine / August 2015
App Labs Blippar (Price: FREE) Blipper can be used to instantly browse and unlock real – time information about any image. One can discover more using this app about objects and images, easily purchase things or book tickets through direct mobile shopping link, witness an amazing 3D animation, click pictures using virtual photo booths and play exciting and fun games. If all of these weren’t enough, it also shares all the experience with social networking sites, which you use daily.
104 / Technowize Magazine / August 2015
105 / Technowize Magazine / August 2015
App Labs iOnRoad – Augmented Driving (Price: VARIED) iOnRoad is the app for those learning to drive. It helps improve your driving in real time. The app uses phone’s camera and sensors to detect the vehicles, sending an immediate alert when in danger. Although, it requires a windshield mount that can be purchased on any browser. This app comes with following features: 1. 3. 5. 7.
collision warning off road warnings ultimate car locator driving analytics
2. 4. 6. 8.
tailgating alert speed sign detections image and video capturing integrated navigation
106 / Technowize Magazine / August 2015
107 / Technowize Magazine / August 2015
App Labs Legendary (Price: FREE) The Legendary VR app gives players a peek at what’s in store for the upcoming year in Beware Crimson Peak, Warcraft: The Skies of Azeroth, and the company’s Pacific Rim-themed Jaeger Pilot. Users can weave across the kingdom of Stormwind in Azeroth through an enthralling virtual reality flight sitting atop a Gryphon. Beware Crimson Peak, leaves a scarier trail, putting the user inside the eponymous house from Guillermo del Toro’s upcoming gothic horror film Crimson Peak. Jaeger Pilot throws you into the cockpit of Gipsy Danger, right before the upcoming battle, but rather being tied to the Oculus Rift, is now able to run on Android and iOS devices. These interactive scenes are viewable through Google Cardboard, a headset made out of a fold-out cardboard mount for VR applications.
108 / Technowize Magazine / August 2015
109 / Technowize Magazine / August 2015
App Labs Insurgent (Price: FREE) Looks like we’ve arrived in the age of fandom! If you happen to own a Google Cardboard or a VR-based headset, you can enjoy actual stimulation by entering into the world of “Insurgent”. If you’ve seen the movie or read the books, you’ll easily recognize your surrounding and understand what is happening to your virtual reality character. Mirroring Insurgent, the app gives you a 360-degree experience of the dystopian world and lets you confront your fears. The app also features an exclusive clip in 3D from the film.
110 / Technowize Magazine / August 2015
111 / Technowize Magazine / August 2015
App Labs SHADOWNGUN (Price: $4.99) SHADOWGUN is one of the best multiplayer sci0fi shooter games available for iOS and Android devices. Set in 2350, it provides an immersive 3D experience, by taking you into the corrupt intergalactic corporations where hiring bounty hunters and mercs is the norm to do one’s bidding. One can complete the tasks and take part in heroic battles with friends using avant-garde weaponry, ships, and the assistance of S.A.R.A, an android assistant.
112 / Technowize Magazine / August 2015
113 / Technowize Magazine / August 2015
tech tech ed ed Paradigms of Computer Programming – Fundamentals This course covers functional, object-oriented, and declarative dataflow programming in a unified framework, with practical code fragments and a simple semantics. About this Course Louv1.1x and Louv1.2x together give an introduction to all major programming concepts, techniques, and paradigms in a unified framework. The course will cover the three main programming paradigms: functional, object-oriented, and declarative dataflow. The two courses are targeted toward people with a basic knowledge of programming. It will be most useful to beginning programming students, but the unconventional approach should be insightful even to seasoned professionals. Louv1.1x covers fundamental concepts. You’ll learn functional programming, its techniques and its data structures. You’ll use simple formal semantics for all concepts, and see those concepts illustrated with practical code that runs on the accompanying open-source platform, the Mozart Programming System. Louv1.2x covers data abstraction, state, and concurrency. You’ll learn the four ways to do data abstraction and discuss the trade-offs between objects and abstract data types. You’ll be exposed to deterministic dataflow, the most useful paradigm for concurrent programming, and learn how it avoids race conditions. Starts: September 21, 2015
Effort: 4 hours/week
Institution: The Université Catholique de Louvain (UCL)
Subject: Computer Science
Length: 5 weeks
Languages: English
Source: https://www.edx.org/ 114 / Technowize Magazine / August 2015
Information Systems and Computer Applications, Part 2: Hardware Learn the basic concepts of information systems and their application in this five part series. Part 2 will focus on hardware. About this Course This is the second part of an introductory business information systems series, designed to introduce you to the amazing world of Information Technology. In this course, you will learn the basic concepts of information systems and their application with a focus on hardware. From storage devices to network hardware and wireless computing/communication devices, you will gain a strong understanding of hardware’s role in today’s technologically-focused world. This course is part two of a five part series. By completing this course, you will be prepared to pass the CLEP Information Systems and Computer Applications exam.
Starts: September 15, 2015 Self-Paced Institution: UPValenciaX Length: 4 weeks
Effort: 4 hours/week Subject: Computer Science Languages: English
Source: https://www.edx.org/
115 / Technowize Magazine / August 2015
tech tech ed ed Systematic Program Design - Part 2: Arbitrary Sized Data Learn the foundations of how to code well - writing programs that tell a clear story about what they do, are tested, and easy to improve. About this Course This programming course is unique in focusing on learning a design method rather than a programming language. This practical method builds on years of research into the structure of good programs that will help you channel your creativity to program well in any language. A primary challenge in programming is deciding exactly what our program should do. The first contribution of the design method is a set of techniques that help you systematically develop your program requirements. You will also learn to produce programs with consistent structure that are easy to modify later. This is important because useful programs always require later improvements. In addition, you will learn how to make your programs more reliable by building tests as an integral part of the programming process.
Starts: September, 2015
Effort: 8-12 hours/week
Institution: UBCx
Subject: Computer Science
Length: 5 weeks
Languages: English Source: https://www.edx.org/
116 / Technowize Magazine / August 2015
Mobile Computing with App Inventor – CS Principles This course introduces basic principles of computer science by designing and building mobile apps in App Inventor for Android. About this Course Learn to use the open development tool, App Inventor, to program on Android devices. You will learn how to design and build mobile apps -- apps that are aware of their location, send and receive text messages, and give advice and directions. The only limit on the types of apps you will learn to build is your own imagination! However, computer science is not just about coding and building apps. We will also learn some of the fundamental principles of computer science. We’ll learn about the potential and the limitations of computing and coding. We’ll learn how the Internet works and about the positive and negative aspects of computing in today’s society, and much more! For these broader computing concepts we will work within an emerging curricular framework -- the Computer Science Principles (CSP). The CSP framework is being developed by leading computer science educators from around the country under the auspices of the College Board and with funding support of the National Science Foundation. In addition to programming and CSP the course is project-based and emphasizes writing, communication, and creativity. Multiple-choice questions, in the style that students can expect to encounter on the AP exam, will also be a key component of this course. Starts: October 19, 2015
Effort: 8 hours/week
Institution: TrinityX
Subject: Computer Science
Length: 6 weeks
Languages: English Source: https://www.edx.org/ 117 / Technowize Magazine / August 2015
tech tech ed ed A System View of Communications: From Signals to Packets (Part 2) Explore the tradeoffs in designing communication systems like mobile phones, and the engineering tools to handle them. About this Course Have you ever wondered how information is transmitted using your mobile phone or a WiFi hotspot? This introductory course seeks to enable you to understand the basic engineering tools used and tradeoffs encountered in the design of these communication systems. This course is divided into three parts. In Part 1, we examine the point-to-point link, which communicates information from a single transmitter to a single receiver. Part 2 examines how multiple transmitters can share the same physical channel. Part 3 discusses how information can be transmitted reliably from one station to another over a network that connects multiple stations. Online interactive exercises are included to help build your intuition. This course was inspired by and built upon the course 6.02 Digital Communication Systems developed at MIT, which Prof Bertram Shi worked on during his sabbatical in 2009.
Starts: October 27, 2015
Effort: 5 hours/week
Institution: HKUSTx
Subject: Computer Science
Length: 6 weeks
Languages: English
Source: https://www.edx.org/ 118 / Technowize Magazine / August 2015
Paradigms of Computer Programming – Abstraction and Concurrency This course covers data abstraction, state, and deterministic dataflow in a unified framework with practical code exercises. About this Course Louv1.2x and its predecessor Louv1.1x together give an introduction to all major programming concepts, techniques, and paradigms in a unified framework. We cover the three main programming paradigms: functional, object-oriented, and declarative dataflow. The two courses are targeted toward people with a basic knowledge of programming. It will be most useful to beginning programming students, but the unconventional approach should be insightful even to seasoned professionals. Louv1.1x (Fundamentals) covers functional programming, its techniques and its data structures. You’ll use simple formal semantics for all concepts, and see those concepts illustrated with practical code that runs on the accompanying open-source platform, the Mozart Programming System. Louv1.2x (Abstraction and Concurrency) covers data abstraction, state, and concurrency. You’ll learn the four ways to do data abstraction and discuss the tradeoffs between objects and abstract data types. You’ll be exposed to deterministic dataflow, the most useful paradigm for concurrent programming, and learn how it avoids race conditions.
Starts: November 2, 2015
Effort: 4 hours/week
Institution: LouvainX
Subject: Computer Science
Length: 6 weeks
Languages: English
Source: https://www.edx.org/ 119 / Technowize Magazine / August 2015
Tech Events & Conferences 30 Aug-01 Sep 2015 World Conference on Information Technology The World Conference on Information Technology, organized by the University of Nevada Reno will take place from 30th August to the 1st September 2015 at the Stratosphere Hotel Tower Convention Center in Las Vegas, USA. The conference will cover areas like Computer Graphics, Computing Methodologies, Digital Forensics, Distance Learning, Algorithms, Artificial Intelligence, E-business, E-commerce, Educational software and Information technology & Arts and Design, Information technology & Commerce etc.
Venue: Stratosphere Hotel Tower Convention. | Las Vegas, USA 04-06 Sep 2015 MetaCon
MetaCon is a 3 day event being held from 4th September to the 6th September 2015 at the Hyatt Regency Minneapolis in Minneapolis, United States Of America. This event showcases products like Costume Contest, Musical Events, Video Gaming, Table Top Gaming, Artists Alley, Room Parties and much more etc. in the Computer Hardware & Software industry.
Venue: Hyatt Regency Minneapolis | Minneapolis, USA 08-10 Sep 2015 Cloud Connect China
Cloud Connect China, organized by UBM China, is the leading event in China’s cloud computing industry with high internationality and professionalism. It was firstly introduced into China in 2013 and is held in Shanghai every September henceforth, which gathers global cloud computing elites and managing executives as speakers. CIO, CTO,technology developers, and end users from application industries like finance, government, education, game, e-commerce and medicine are all active participants.
Venue: Shanghai International Convention.. | Shanghai, China 120 / Technowize Magazine / August 2015
09 Sep 2015 Start With Security The Start With Security, organized by the FEDERAL TRADE COMMISSION will take place on 9th September 2015 at the University of California Hastings College of the Law in San Francisco, USA. The conference will cover areas like Start with Security, Mobile App Developers, Careful Connections, Marketing Your Mobile App, Protecting Personal Information.
Venue: University of California Hastings College of the Law San Francisco, USA
|
09-11 Sep 2015 Wireless Repair Expo Wireless Repair Expo is a 3 day event being held from 9th September to the 11th September 2015 at the Sands Expo & Convention Center in Las Vegas, USA. This event showcases products like wireless routers, technical solutions, wireless gadgets, and equipments associated with this field etc. in the Automotive, Computer Hardware & Software, Industrial Products, Business Services industries.
Venue: Sands Expo & Convention Center | Las Vegas, USA 15 Sep-17 Oct 2015 Connect Security World conference,
The Connect Security World conference, organized by the Strategies Telecoms & Multimedia will take place from 15th September to the 17th October 2015 at the Palais du Pharo in Marseille, France. The conference will cover areas like Mobile, Iot and Cloud Bring an Ever-growing Variety and Volume of Threats to Personal and Enterprise Assets. Connect Security World Has Taken over “chip-to-cloud Security Forum� to Better Reflect and Address the Huge Challenges of Securing Connected Devices and Online Transactions.
Venue: Palais du Pharo | Marseille, France
121 / Technowize Magazine / August 2015
Tech Events & Conferences 25 Sep-01 Oct 2015 International Computer Music Conference The International Computer Music Conference, organized by the University of North Texas will take place from 25th September to the 1st October 2015 at the University of North Texas in Denton, United States Of America. The conference will cover areas like Digital Communities,Big Data,Futurism ,Robotics,“Looking Back, Looking Forward.
Venue: University of North Texas | Denton, USA 27 Sep-03 Oct 2015 Quark Matter Conference
The Quark Matter Conference, organized by the Quark Matter will take place from 27th September to the 3rd October 2015 at the Kobe Fashion Mart in Kobe, Japan. The conference will cover areas like qcd at high temperature, correlations and fluctuations, future experimental facilities, upgrades, and instrumentation.
Venue: Kobe Fashion Mart | Kobe, Japan 30 Sep-02 Oct 2015
International Conference on The Network of The Future The International Conference on The Network of The Future, organized by the De Nouvelles Architectures pour les Communications will take place from 30th September to the 2nd October 2015 in Montreal, Canada. The conference will cover areas like Technologies for Future Internet, Network protocols and architectures, Autonomous and self-organized networks, Self-Management frameworks, Quality of service and traffic engineering, Cyber-physical systems and the Internet of Things, Machine-to-machine networking and much more related issues.
Venue to be announced | Montreal, Canada 122 / Technowize Magazine / August 2015
06-07 Oct 2015 Intelligent Assistants Conference The Intelligent Assistants Conference, organized by the Opus Research, Inc. will take place from 6th October to the 7th October 2015 at the New York Palace Hotel in New York, USA. The conference will cover areas like Digital Commerce.Omnichannel Customer Experience,Mobile Self-Service.Emerging Technologies.Web chat and Web-based Interactions.
Venue: New York Palace Hotel | New York, USA 30 Sep-02 Oct 2015
International Conference on The Network of The Future The International Conference on The Network of The Future, organized by the De Nouvelles Architectures pour les Communications will take place from 30th September to the 2nd October 2015 in Montreal, Canada. The conference will cover areas like Technologies for Future Internet, Network protocols and architectures, Autonomous and self-organized networks, Self-Management frameworks, Quality of service and traffic engineering, Cyber-physical systems and the Internet of Things, Machine-to-machine networking and much more related issues.
Venue to be announced | Montreal, Canada 29 Oct-01 Nov 2015 International AES Convention
The International AES Convention, organized by the Audio Engineering Society will take place from 29th October to the 1st November 2015 at the Jacob Javits Center in New York, United States Of America. The conference will cover areas like recording and production, to broadcast and streaming, game audio, live sound, post-production, sound for picture, product design and more.
Venue: Jacob Javits Center | New York, USA
123 / Technowize Magazine / August 2015
Tech Events & Conferences 02-06 Nov 2015 The International Conference On Computer-aided Design The The International Conference on Computer-Aided Design, organized by the IEEE CEDA Council on Electronic Design Automation will take place from 2nd November to the 6th November 2015 at the DoubleTree by Hilton Hotel Austin - University Area in Austin, United States Of America. The conference will cover areas like The International Conference on Computer-Aided Design is one of a kind program dedicated to the field of Computer-Aided Design. The program is designed to provide a dynamic setting for researchers from the social web as well as from the semantic web communities from across the globe in the field of Computer-Aided Design to gather and discuss on various crucial issues related to the field preventing the smooth functioning of the same. The participants will also get ample opportunity to discuss and share state of the art, recent advances and future perspectives for the industry. You will leave the conference with cutting edge information and new business relations.
Venue: DoubleTree by Hilton Hotel Austin – University Area in Austin | Austin, USA 02-03 Nov 2015 Conference On Online Social Networks
The Conference On Online Social Networks, organized by the Association for computing machinery will take place from 2nd November to the 3rd November 2015 at the Stanford University in California City, US. The conference will cover areas like Systems and algorithms for social search.Infrastructure support for social networks and systems.Social properties in systems design. Communities in social networks.
Venue: Stanford University | California City, USA
124 / Technowize Magazine / August 2015
03-05 Nov 2015 Big Data Big Data is a 3 day event being held from 3rd November to the 5th November 2015 at the Santa Clara Convention Center in Santa Clara, USA. This event showcases products like most longstanding and significant event in the world of cloud computing etc. in the Computer Hardware & Software industry.
Venue: Santa Clara Convention Center | Santa Clara, USA 07-08 Nov 2015 NationJS Java Script Conference
The NationJS Java Script Conference, organized by the JavaScript community will take place from 7th November to the 8th November 2015 in Washington, USA. The conference will cover areas like Theory and Practice of Functional Reactive Javascript.
Venue to be announced | Washington, USA 30 Nov-04 Dec 2015 Embedded Software Engineering Congress
The Embedded Software Engineering Congress, organized by the MicroConsult Microelectronics Consulting & Training GmbH will take place from 30th November to the 4th December 2015 at the Stadthalle Sindelfingen in Sindelfingen, Germany. The conference will cover areas like extensively on the manifold issues and challenges with respect to the development of device and system software for industrial applications, automotive engineering, automation, drives, measurement systems, communication systems as well as consumer electronics and medical devices.
Venue: Stadthalle Sindelfingen | Sindelfingen, Germany
125 / Technowize Magazine / August 2015
126 / Technowize Magazine / August 2015
127 / Technowize Magazine / August 2015