welcome

Selamat datang di blog Imyu Cyber'07.



Silahkan Cari Artikel Dengan Kolom Pencarian Di bawah ini.

Pencarian Artikel

Kategori

Wednesday, February 20, 2013

Development of Human Robot Interaction

BOSTON - It's time for people to re-examine their relationship with the machine and its impact before it's too late, says a leading researcher on Friday, February 15th and the annual meeting of the American Association for the Advancement of Science.
People are more and more often looking for toys and robotic equipment to be friends and tend to be less attentive to others, says Sherry Turkle, professor of social science study programs and technology at MIT.
Innovations such as Siri, Apple's iPhone digital assistant, makes people become increasingly dependent on machines, says Sherry, and imagine a future when robots become advanced enough to work as a teacher for children and caregivers for seniors.
"The idea of ​​an artificial companion has become a new thing that is considered reasonable," said Sherry.
"Children play with robotic pets and become familiar with the computer game. I feel a new life that is considered reasonable to have an impact. To make a new artificial companion be fair, we must change ourselves and during the process, we reorder the human values ​​and human relationships. "
Robot dogs and caregiversSherry studied human feelings and thoughts about the robot and he found a culture change for some time. Research done in the 1980s and 1990s showed, the relationship of love and friendship only happen between people, but now many people who say that robots could also fill that role.
For example, Sherry has studied Paro, a robot baby dogs were used as elderly friend who had dementia or depression. It appears that the technology is progressing rapidly. There was a woman who experienced adversity talking to Paro and feel comfortable.
Experts say that in the future, robots could be a good caregiver for the elderly, because the robot can be programmed with high patience and will not commit acts of harassment, incompetent or lie.
But Sherry is concerned that it can replace the role of the human caregiver with robots.
"We showed a bit of attention to what the parents are saying. We even make a machine that literally makes the story of the parents to be heard by the machine. "
Friends of childhoodInstead, children are increasingly being playing with electronic toys and robotics. Many of those who had previously played with such digital pet Tamagotchi in the 1990's and later named Aibo robotic dog, who need care and make children keep and care for the toy.
Some children said that they would prefer a "pet" is compared to dogs and cats can be real old and die.
"People before buying a pet to teach about life and death for their children," said Sherry. "Now we teach children that living a real risk while the robot is safe."
Sherry interviewed a teenager in 1983, asked him who he would talk about the issue of romance. The boy replied that he would speak to his father, not a robot, because the machine will not be able to understand human relationships.
In 2008, Sherry interviewed children of the same age, from the same neighborhood as the previous interview. This time, the boy replied that he preferred to talk to the robot, which is programmed with a lot of knowledge about the various patterns of data relationships, rather than talking to his father, who could have given bad advice.
"Over the past 25 years of human failure worse, than the previous one has a sense of affection and a bond has become desensitized," says Sherry. "To me the most important thing to do children and adults is to learn to be close and trusting others. We forget important things about caring and conversations that only happens between people. "
Robotic MomentIn a number of interviews with people of different ages and backgrounds, Sherry finds that today many of us who fantasize about a robot that could be a friend, who always listened to us, never angry or upset.
"What we talk about when we talk about robots? That is, we talk about the fear of others, "he said. "Disappointment us against each other. Lack of our social relationships. Lack of our time. "
Although robots have not so advanced to be a friend of our illusions, but that era will not be long.
"Right now we are in a moment of robotics," said Sherry. "Not because we have created a robot that can become our partner, but because we were ready to be their partner."
It is time, he said, to pull back a step and consider how and when we want to let the machines into our lives and when we had to turn them.





 source;Perkembangan Interaksi Manusia dan Robot

Tuesday, February 19, 2013

Here's How Hackers Sign On Facebook


Facebook acknowledged that they have infiltrated the security system hackers. Not a hacker is nuts, because he managed to fool the biggest social networking sites protect it.

 Until now I have not known who was behind the attack, but strong suspicion leads to the hackers who tease large number of sites in the United States (U.S.), such as the New York Times, Washington Post, Wall Street Journal and even Twitter.

 Facebook is also quite intelligent breaker. He did not openly attack, but the developers infiltrate through the computer network said. As a result, he successfully entered into the Facebook system undetected for nearly a month.

 "Last month, Facebook Security, Facebook's security division found that our system has diserangan hackers," wrote Facebook information recently.

The ways in which hackers insert malware into is commonly visited site developers. Malware is then entered into the computer, then access Facebook without the knowledge of the network administrator.

 Penetrating into the Facebook network predicted hackers exploit loopholes Oracle Java, this hole also was used to pave the offender into the system Twitter.

 As quoted from forbes, Monday (18/02/2013), is not mentioned in detail how actors use the slot, but users are encouraged to stop using Java. Because of the gap in these applications is often used as a 'door' cyber criminals.

 "As the first company to successfully capture this malware, we will learn more., And we will soon announce what measures to prevent it," closed caption Facebook on his blog.





 source;Begini Cara Hacker Masuk ke Sistem Facebook

FBI hunt hackers On Facebook?

Action hacker who managed to infiltrate into the Facebook network is quite horrendous. Even to the extent that the FBI had been deployed to track down the perpetrators.

 Yes, some time ago Facebook acknowledged that its network was possessed by the hacker. This incident allegedly happened a long time because Facebook recently admitted a month after the actor in action.

 However, Facebook claims that no data any user who managed digasak offender. Even those who claim to be capturing malware hackers to infiltrate. This malicious program will be further studied to find the antidote.

 As quoted by Reuters on Tuesday (19/02/2013), in addition to analyzing malware obtained Facebook now also is working with the FBI to find the perpetrators.

 A number of tracks that hackers had already been collected, and refers to a group of hackers based in China. Facebook breaker also allegedly responsible for hacking other actions experienced by Twitter, New York Times, Washington Post, and the Wall Street Journal.







 source;FBI Hunting Facebook Hackers?

Monday, February 18, 2013

Five mobile operators reported to the attorney general

Jakarta (ANTARA) - Five mobile operators and 16 company Internet Service Provider (IVP), Monday, reported to the Attorney General regarding alleged corruption network usage frequency has been ongoing since 2004 until now to the detriment of the state finance Rp16, 8 trillion.

 Reporting of allegations of corruption, namely, NGOs Actual Implementation Combating Collusion, Corruption and Nepotism (NGOs RIP ~ CCN) by visiting the AGO Law Information Center.

 Complainant's attorney, Rolas Sitinjak Budiman, on Monday said the report related to the alleged body of Corruption in Telecommunications Network Operator that uses the frequency spectrum with the same bermodus employment agreement with Telecommunications Service Providers and by not paying the fee (BHP) to state resulting in state losses.

 "Or in other words that each Telecommunications Service Provider that uses a frequency that is usually done by your Internet Service Provider (ISP) BHP shall pay to the State," he said.

The five operators, namely Telkomsel Flash with 3G frequencies, XL Axiata with Frequency 3G, 3G Indosat and Bakrie Telecom (FWA) by using Fixed Wireless Access.

  While 16 ISP, namely, Indonet, IM2, AT & T LSP, Sistelindo, Biznet, CBN, Central Online, Online Centrin, ipnet, Jalawave, RadNet, Cepatnet / Moratel, Quasar, Andalas Internet and Lintasarta --- Indosat Subsidiary.

 If you do not make payments then there has been corruption as regulated in Law Number 31 of 1999 on Corruption Eradication as amended and supplemented by Law No. 20 of 2001 on the amendment of Law No. 31 Year 1999 on Eradication of Corruption.

 Explained, state losses of Rp16, 8 trillion based on a count of some of the material we collect include White paper BHP DGPT Frequency Band 2009 to FWA (Fiexed Wireless Access) and 3G Winner calculation for GSM operators as much as Rp320 billion per year.


 "We request that the Attorney General of the Republic of Indonesia Special Criminal Affairs and follow-up response to our report in accordance with the laws of the Republic of Indonesia Number 16 Year 2004 concerning the Prosecutor of the Republic of Indonesia and the Republic of Indonesia Regulation Number 38 Year 2010 on the organization and administration of the Republic of Indonesia Attorney Work," he said.

 Meanwhile, President of the NGO RIP ~ CCN, Feriyanto stated, the fifth operator is the same as the case of Indosat and IM2 graft allegations network usage frequency of 2.1 Ghz/3G PT Indosat Mega Media (IM2) adverse state finances R1, 3 BPKP trillion based on the results of the audit.

 "So do not just wear the AGO Indosat, but also to have wear five operators and 16 other ISPs," he said. (Rr)





 source; Lima Operator Seluler Dilaporkan ke Kejagung





PlayStation 4 could for Streaming Games?



Ghiboo.com; Cloud gaming technology, may be a technology that will be used in Sony's new PlayStation 4 console. 
This is evident from Sony step in acquiring cloud-gaming company, Gaikai, last year.
 According to the Wall Street Journal, Sony's latest gaming console that may be announced on Wednesday (20/02) at an event in Manhattan, United States of America will feature a game that is accessible via internet streaming.

 Gakai, as cloud service providers, creating a data center which is designed to play many modern games via streaming.

 This is the reason analysts predicted that the PlayStation 4 will have the base game through streaming media.
 According to some analysts, the streaming game system makes piracy will be a tough game.
 In addition, the steps taken by Sony is useful to enhance PlayStation games are categorized by weight, in order to outperform the simple games are often played through a smartphone or tablet.

 However, no definite assurance given by Sony on this matter, according to the rumor that the PlayStation 4 will still use optical media as the storage game.





Hopefully this info is useful to you.
Thanks for your visiting this blog.


  source; Bisa Streaming Game di PlayStation 4?