. Medical and Hospital News .




.
CYBER WARS
'Minority Report' software hits the real world
by Staff Writers
Washington (AFP) July 22, 2012


The software behind the film "Minority Report" -- where Tom Cruise speeds through video on a large screen using only hand gestures -- is making its way into the real world.

The interface developed by scientist John Underkoffler has been commercialized by the Los Angeles firm Oblong Industries as a way to sift through massive amounts of video and other data.

And yes, the software can be used by law enforcement and intelligence services. But no, it is not the "pre-crime" detection program illustrated in the 2002 Steven Spielberg sci-fi film.

Kwin Kramer, chief executive of Oblong, said the software can help in searching through "big data" for information. It can also create souped-up video-conference capabilities where participants share data from multiple devices like smartphones and tablets, integrated into a large video display.

"We think the future of computing is multiuser, multiscreen, multidevice," Kramer told AFP.

"This system helps with big workflow problems."

A key part of the system is the gesture interface, which the company calls the "g-speak" spatial operating environment.

That grew out of a project by Underkoffler -- then a scientist at the prestigious Massachusetts Institute of Technology -- for "Minority Report," before he became chief scientist at startup Oblong.

"We have demo versions of this kind of software which show exactly the 'Minority Report' user experience, allowing you to move back and forth in time, or to zoom in to look at details," Kramer said.

He said the same software can help businesses to "allow better collaboration, visualization and analysis of large amounts of data.

"You can have a lot of data but it's hard to make use of that," Kramer said.

"It can be on different machines and hard to access. This allows multiple people to look at that."

Gestural interfaces have been developed for other firms including Microsoft's Kinect but Oblong says it has far more sophisticated systems which can use Kinect and more.

Some highly sensitive systems use a data glove which can be more precise than ordinary hand movements.

Oblong has contracts with firms such as Boeing, General Electric and Saudi Aramco to help in analyzing large amounts of data. It is also developing a gestural interface for onboard computers with automaker Audi.

It has raised an unspecified amount of venture capital from investors including Foundry Group, Energy Technology Ventures and Morgan Stanley Alternative Investment Partners.

Brad Feld, managing director at Foundry Group, said Oblong offers "a path to fundamentally change the way we interact with computers."

Yet the question Oblong often gets is how users can get the "Minority Report" software.

David Schwartz, the company's vice president for sales, said "We get calls from people in the military who say, 'I want the 'Minority Report' interface."

He said the systems could be used for a realistic version of high-tech software interfaces on TV shows like "CSI."

"They would like to get it for free," he added.

What makes the real-life version of the software different from the one seen on film is that Oblong does not supply the analytics of the futuristic "pre-crime" division.

That does not prevent a company or law enforcement agency from using the software and adding its own analytics.

"We think law enforcement and intelligence are big data users and we think our technology is the leader," Kramer said.

He said Oblong currently has no government customers in the United States or abroad but offers itself as "a core technology provider."

Still, Oblong leverages its role in the movies to get in the door, even if the software is not quite the same.

"I think most people look at those 'Minority Report' interfaces and imagine how they could use that flexible system in their own office or designs studio," Kramer said.

"It isn't science fiction, it's real."

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues




.
.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries


Too many cyber attacks hushed up, US panel says
Washington (AFP) July 19, 2012 - US cybersecurity efforts are hampered by attacks that go unreported by victims unwilling to divulge confidential information, a research panel said Thursday.

The report by the Bipartisan Policy Center said the number of cyberattacks appears to be on the rise, along with financial losses.

It said that from October 2011 through February 2012, over 50,000 cyber attacks on private and government networks were reported to the Department of Homeland Security, including 86 attacks on "critical infrastructure networks."

But it noted that these "represent only a small fraction of cyber attacks carried out in the United States."

The think tank's cybersecurity task force headed by former National Security Agency chief Michael Hayden and businessman Mortimer Zuckerman said more sharing of information would help bolster cybersecurity.

"Despite general agreement that we need to do it, cyber information sharing is not meeting our needs today," the report said.

It said many private firms keep the news of the attacks secret "because of fears, some justified, including harm to their reputations and potential loss of customers."

Some worry that the information could become part of the public record in a government database, and some "are concerned that they may be held liable for the threat information they share if it turns out to be inaccurate."

The report noted that current law does protect the confidentiality of certain data, but that this effort could be expanded. It said some industry groups which aggregate information on attacks have been threatened with lawsuits if they implicate certain entities in attacks.

It said some of these concerns can be addressed in cybersecurity legislation, which has been stalled in Congress.

"Some companies take the position that under current law, sharing communications with the government cannot be done without a subpoena," the report said.

"With the right privacy and civil liberties protections in place, there is no valid reason for cyber threat information not to be shared with the federal government and a subpoena requirement can often thwart information sharing to identify and stop cyber attacks underway.

"The law should be changed to explicitly permit such sharing, without a subpoena, under conditions that protect privacy and civil liberties."



.

. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



CYBER WARS
Senators revive US cybersecurity bill, with changes
Washington (AFP) July 20, 2012
A group of US senators has revived stalled cybersecurity legislation by offering compromises to address civil liberties concerns, an effort quickly endorsed by President Barack Obama. The new bill drew some support from Republican lawmakers amid a drive to pass legislation before the summer recess, but prospects for passage were unclear. Lawmakers said they hope to bring the measure to t ... read more


CYBER WARS
Japan firm 'told workers to lie about radiation dose'

Japan sets compensation for Fukushima evacuees

Raytheon technology to transform commercial cargo ships into cutting-edge humanitarian aid delivery platforms

Two China workers killed in Singapore tunnel accident

CYBER WARS
GMV Leads Satellite Navigation Project In Collaboration With The South African National Space Agency

SSTL signs contract with OHB for second batch of Galileo payloads

Phone app will navigate indoors

Announcement of ACRIDS product line for Precision Airdrop Systems

CYBER WARS
Kissenger: virtual lips for long-distance lovers

Oregon's Paisley Caves as old as Clovis sites - but not Clovis

Unique Neandertal arm morphology due to scraping, not spearing

Neanderthals at El Sidron, Northern Spain, had knowledge of plants' healing qualities

CYBER WARS
Primate behavior: Chimps select smart tools, monkeys intentionally beg

Asia fuels record elephant, rhino killings: WWF

Researchers publish results of an iron fertilization experiment

French crusader for gibbons in Borneo jungle

CYBER WARS
Researchers unveil promising TB drug cocktail

'No excuse' for not turning tide on AIDS: expert

'No excuse' for not turning tide on AIDS: expert

Scientists urge fresh push for AIDS cure

CYBER WARS
China activist gets hard labour in Tiananmen row

China's Ai Weiwei loses appeal against tax fine

Teenage Tibetan monk 'self-immolates' in China

China protests use health threats as rallying cry

CYBER WARS
Somali pirates release Taiwan fishing boat

ONR Sensor and Software Suite Hunts Down More Than 600 Suspect Boats

Netherlands beefs up anti-piracy forces

Incidence, types of marine piracy studied

CYBER WARS
China vows to keep tight grip on property prices

Spanish deal fails to ease eurozone fears

Fitch downgrades three major Japanese banks

Walker's World: The Spanish agony


Memory Foam Mattress Review

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement