Artificial Intelligence, Engineering, Security

The Internet of Things Is Here

The Internet of things… sounds interesting. Smart cities, smart homes, smart cars, smart everything.

It’s estimated by 2020 there will be 50 billion objects connected to the internet.  The current internet protocol, IPV6, creates more potential addresses than there are atoms on the surface of the earth.

How it Works

  1. Sensors that transmit data are embedded in the physical things around us.
  2. This data may be processed locally in the individual devices.
  3. If the data is too large or the device is not connected on the internet, it is stored locally.
  4. The next level is networking, where the device is connected to the internet. WiFi developments are making the internet of things work better.
  5. Cloud processing with more power than local processing, where data from different sensors is processed and analyzed.
  6. And finally cloud storage where processed data is stored to be consumed and used in different applications.

As these intelligent systems of devices share data and analyze it over the cloud, they are transforming our world in countless ways.

  • monitoring the weather
  • monitoring our personal health
  • giving real time updates on where to park our cars
  • IoT on cars and streets to facilitate rush hour traffic
  • smartphones, tablets, smart TVs, smart refrigerators

Yes. The internet of things is already in effect. There are so many startups. Very many ideas and projects in our colleges and universities. Big corporations are investing billions on IoT. And I really look forward to how this could save lives, especially in health monitoring and emergency services.

IoT will come with security issues. Yes I love IoT, but this part gets me a little bit terrified. Technology that you may not even be aware of is monitoring your every move. I once made a video on this but I was threatened so I scrapped it off immediately. Anyway it’s no secret that I am an optimist.  I don’t want to talk about many DDoS attacks and creepy children toys. The internet of things can be a weapon of  mass destruction.

Next week I’ll tell you how easy or hard it is to take over the world. How we can eliminate this situation where access to health depends on income, monitoring climate, technocracy and privacy, one of the big societal concerns.

Let’s talk tech!

 

 

Security

Prime Number Magic

Math is central to our daily lives. This is a fact, whether you love it, hate it, or don’t even understand it in the first place.

Numbers are weird objects; and I’m particularly fascinated by prime numbers.  A prime number is only divisible by itself and 1. Another mysterious fact is that every even number is the sum of two primes. Today I’ll talk about an algorithm, as an example of how math is crucial to our online security.

As a mathematician I love algorithms; instructions that solve problems. Algorithms are ancient. As much as I’d talk about technology, they are not exclusive to the world of technology. The first algorithm was to find the Greatest Common Divisor(G.C.D) of a number. One modern algorithm you may have heard of is the Pagerank algorithm by Larry Page and Sergey. If you’ve not heard of it, then you’ve used it. This is the algorithm used to rank web pages by Google, the world’s leading search engine. Creating algorithms requires a lot of creativity and genius. It’s no surprise only a few come up with world-changing and award-winning algorithms.

Now, back to prime numbers. E-commerce and the internet wouldn’t be safe without these special numbers.

Banks, websites and other systems use the RSA public-key encryption algorithm to keep our internet secrets. RSA are the initials of the people that came up with the algorithm; Rivet, Shamir, Adleman.

RSA encryption is achieved by producing a public key and a private key. The public key is two massive primes multiplied together. The public key is available for anyone to use.  If you want to decode the secret key, you need to know the original prime numbers. The only way to do this would be to take that massive number and factorize it. This is impractical with current technology. And this is how prime numbers uniquely secure our information.

This is just an example of the many ways math impacts our lives and an application of prime numbers. If you love cryptography and code cracking don’t go far as more is coming. Let’s talk tech!