Tuesday, 21 June 2016

Meet the real woman behind the voice of Siri iPhone


There are over 700 million iPhones in the world, and since 2011 they've all come with Siri, a virtual personal assistant who can help you do everything.   

In America, Siri's voice was provided by Susan Bennett, in a role that catapulted her from successful but obscure voice actor to slightly more successful and slightly less obscure voice actor. (That's about as much as voice actors can strive for.) Susan told us all about the weird lessons she's learned from having her voice come out of everyone's pocket.  

Susan Bennett (born 1948/1949) is an American voice-over artist. She is best known for being the female American voice of Apple's "Siri" since the service was introduced on the iPhone 4S on October 4, 2011.  (Source:  Wikipedia)

Let's meet her in person through this YouTube video!



Eight things you might not know about black boxes

With the crashes of AirAsia flight QZ8501 and Malaysia Airlines MH17, along with the disappearance of flight MH370, there is again focus on airline "black boxes".

What is "black box"?

An airplane actually has two black boxes: a flight data recorder, which stores information on specific parameters such as flight control and engine performance, and a cockpit voice recorder, which records background sound and conversations between crew members and air traffic control.


Here are some things you might not know about black boxes.


  1. They're not black:  Black boxes are the same colour as the Golden Gate Bridge in San Francisco ... kind of. They are a tone of what's known as international orange, which is a set of three colours used in aerospace and engineering to distinguish objects from their surroundings. The Golden Gate Bridge is a darker shade, while the international orange used for black boxes is much brighter.
  2. A 'black box' comes in two parts:  The "black box" is made up of two separate pieces of equipment: the flight data recorder (FDR) and a cockpit voice recorder (CVR). They are compulsory on any commercial flight or corporate jet, and are usually kept in the tail of an aircraft, where they are more likely to survive a crash. FDRs record things like airspeed, altitude, vertical acceleration and fuel flow. Early versions used wire string to encode the data; these days they use solid-state memory boards. Solid-state recorders in large aircraft can track more than 700 parameters.
  3. They were invented by an Australian:  Dr David Warren's own father was killed in a Bass Strait plane crash in 1934, when David was just nine years old. In the early 1950s, Dr Warren had an idea for a unit that could record flight data and cockpit conversations, to help analysts piece together the events that led to an accident. He wrote a memo for the Aeronautical Research Centre in Melbourne called "A Device for Assisting Investigation into Aircraft Accidents", and in 1956 produced a prototype flight recorder called the "ARL Flight Memory Unit". His invention did not get much attention until five years later, and the units were eventually manufactured in the UK and US. However, Australia was the first country to make the technology compulsory.
  4. Experts don't call them "black boxes":  The term "black box" is favoured by the media, but most people in the know don't call them that. There are several theories for the original of the name "black box", ranging from early designs being perfectly dark inside, to a journalist's description of a "wonderful black box", to charring that happens in post-accident fires.
  5. Only 2 hours of cockpit conversations are kept:  Digital recorders have enough storage for 25 hours of flight data but only two hours of cockpit voice recording, which is recorded over itself in a loop. The CVRs track the crew's interactions with each other and air traffic control, but also background noise that can give vital clues to investigators. Earlier magnetic tape versions could only record 30 minutes of cockpit conversations and noise, which was also recorded in a loop.
  6. It can take a long time to find one:  Black boxes are fitted with an underwater locator beacon that starts emitting a pulse if its sensor touches water. They work to a depth of just over four kilometres, and can "ping" once a second for 30 days before the battery runs out, meaning MH370's black box stopped pinging around April 7, 2014. After Air France flight 447 crashed into the Atlantic Ocean, it took search teams two years to find and raise the black boxes. They provided valuable information about what actually happened prior to the crash.
  7. They're virtually indestructible:  FDRs are usually double-wrapped in titanium or stainless steel, and must be able to withstand atrocious conditions. The crucial part that contains the memory boards, the CSMU, is shot out of an air cannon to create an impact of 3,400 Gs and then smashed against a target. It is subjected to a 227kg weight with a pin attached to it, which is dropped onto the unit from a height of three metres. Researchers try to crush it, destroy it in an hour of 1,100 degree Celsius fire, submerge it in a pressurised salt water tank, and immerse it in jet fuel.
  8. But they're not as powerful as your phone:  In the aftermath of MH370, experts say it might be time to update methods of collecting flight data. Passengers are able to text, stream and surf the internet but the data recorders on board are not communicating in real time with the rest of the world. However, the bandwidth needed to stream huge amounts of data from large aircraft is not currently feasible. Aviation author Stephen Trimble writes in the Guardian that Boeing has applied for a patent on a system that will transmit a subset of data including the plane's location. 



Taken from:  abc.net.au

Samsung: What's next?

According to digitaltrends.com, Samsung will launch its first bendable smartphone in early 2017.  Sources have told that the smartphone can be fold like a wallet.  It comes with two size of 5 inches screen display while the other one is 8 inches.



An official from Samsung Display told the publication that although foldable screens may seem highly futuristic, the time is right for this mind-bending technology. “The industry believes that the commercialization of foldable smartphones will be possible in 2016,” the unnamed official stated.

Meanwhile, Samsung launch its first in the world curved TV in the midst of 2014 and been getting positive feedback from consumers.  

With the existence of foldable phones, I am sure that that will be such a good news to certain target market and I believed that screen cracking won't be a big deal for Samsung smartphone users!


Source:  digitaltrends.com

ARTIFICIAL INTELLIGENT (AI)

WHAT IS ARTIFICIAL INTELLIGENT?

According to Simple English Wikipedia, artificial intelligent (AI) is defined as 'the ability of a computer program or a machine to think and learn'.  Meriam-Webster on the other hand defined AI as 'an area of computer science that deals with giving machines the ability to seem like they have human intelligence' and 'the power of a machine to copy intelligent human behavior'. 

EXAMPLE OF ARTIFICIAL INTELLIGENT

Below is the list of AI example taken from one article in Beebom.com called '10 Examples of Artificial Intelligence You’re Using in Daily Life'. 

  1. Virtual personal assistant
  2. Video games
  3. Smart cars
  4. Purchase prediction
  5. Fraud detection
  6. Online customer support
  7. News generation
  8. Security surveillance
  9. Music and movie recommendation services
  10. Smart home devices
Robot also is one of AI example


For full article, you can click at this link.

So do you think you are too depending on AI after reading this entry?

Monday, 20 June 2016

20 Things You Didn't Know About Computer Hacking

1  Hacker originally meant “one who makes furniture with an ax.” Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle.

2  Computer hacking was born in the late 1950s, when members of MIT’s Tech Model Railroad Club, obsessed with electric switching, began preparing punch cards to control an IBM 704 mainframe.

3  One of the club’s early programs: code that illuminated lights on the mainframe’s console, making it look like a ball was zipping from left to right, then right to left with the flip of a switch. VoilĂ : computer Ping-Pong!

4  By the early 1970s, hacker “Cap’n Crunch” (a.k.a. John Draper) had used a toy whistle to match the 2,600-hertz tone used by AT&T’s long-distance switching system. This gave him access to call routing (and brief access to jail).

5  Before they struck it rich, Apple founders Steve Wozniak and Steve Jobs made and sold “blue boxes,” electronic versions of Draper’s whistle.



6  Using a blue box, Wozniak crank-called the Pope’s residence in Vatican City and pretended to be Henry Kissinger.

7  Hacking went Hollywood in the 1983 movie WarGames, about a whiz kid who breaks into a Defense Department computer and, at one point, hi­jacks a pay phone by hot-wiring it with a soda can pull-ring.

8  That same year, six Milwaukee teens hacked into Los Alamos National Lab, which develops nuclear weapons.

9  In 1988 Robert T. Morris created a worm, or self-replicating program, purportedly to evaluate Internet security.


10  The worm reproduced too well, however. The multi­million-dollar havoc that ensued led to Morris’s felony conviction, one of the first under the Computer Fraud and Abuse Act (PDF).




11  They all come home eventually. Morris now researches computer science at...MIT.
12  British hacker Gary McKinnon broke into 97 U.S. Navy, Army, Pentagon, and NASA computers in 2001 and 2002.
13  McKinnon’s defense: He wasn’t hunting military secrets; he was only seeking suppressed government files about space aliens.
14  According to rumor, agents of China’s People’s Liberation Army attempted to hack the U.S. power grid, triggering the great North American blackout of 2003.
15  It took IBM researcher Scott Lunsford just one day to penetrate the network of a nuclear power station: “I thought, ‘Gosh, this is a big problem.’”
16  Unclear on the concept: When West Point holds its annual cyberwar games, the troops wear full fatigues while fighting an enemy online.
17  Think your Mac is hackproof? At this year’s CanSecWest conference, security researcher Charlie Miller used a flaw in Safari to break into a MacBook in under 10 seconds.
18  Cyborgs beware: Tadayoshi Kohno at the University of Washington recently hacked into a wireless defibrillator, causing it to deliver fatal-strength jolts of electricity.
19  This does not bode well for patients receiving wireless deep-brain stimulators.
20  The greatest kludge of all? Roger Angel of the University of Arizona has proposed building a giant sunscreen in space to hack the planet’s climate.

Saturday, 18 June 2016

Author background

Hi guys!

I am Lydia Rusli. I am an Executive Master in Business Administration in Arshad Ayub Graduate Business School

This blog is meant for Managerial Information System subject (MIS750).