Nokia: Next Generation Virtualized Network
Nokia Solutions and Networks (NSN) and Korean operator SK Telecom have laid the groundwork that could virtualize a mobile network’s core, meaning operators will be able to deploy new services with ease. Thanks to virtualization and cloud computing, enterprise system architecture and management has changed, and now mobile network operators want the same convenience. The developing technology, known as network functions virtualization (NFV) is designed to move them away from today’s equipment to a cloud-based infrastructure, so it can be more flexible. This would allow services to roll out faster while also cutting costs, which could make services more affordable for the consumer.
Privacy Concerns Result from Google’s Help in Child Pornography Arrest
A man was arrested on child pornography charges after Google found images on his computer. Google’s servers scan the Internet for child pornography, since all images uploaded to the Internet have a unique digital fingerprint. Neighbors were astonished when FBI raided the man’s home, claiming he had more than 3,000 images on his phone. The investigation began in March after two photos were found in Google’s Picasa cloud photo storage service. When the photos were discovered, Google reached out to the National Center for Missing and Exploited Children, which then found more images on a Tumblr account the man owned. Google has responded by saying that if you have an account with them, they’re not just searching through your photos at random, but looking for the digital fingerprints the FBI could be interested in.
Computer Teaching Itself Common Sense with Images
In an effort to determine if a computer can learn the same way a human can, a computer program is trying to learn common sense by analyzing images 24 hours a day. The Never Ending Image Learner (NEIL) is running at Carnegie Mellon University, and is funded by Google and the U.S. Department of Defense’s Office of Naval Research. NEIL has looked at three million images since July, identifying 1,500 objects in half a million images, 1,200 scenes in hundreds of thousands of images, and has made 2,500 associations. The team hopes NEIL will learn the relationships between objects without being taught.
Cyber Experts Baffled for Two Years by Cryptic Internet Scavenger Hunt
For two years, an online organization has been sending the finest code breakers in the world a series of problems that seem unsolvable. Last January, 34-year-old computer analyst Joel Eriksson, a computer analyst from Sweden found a message: “Hello,” it said. “We are looking for highly intelligent individuals. To find them, we have devised a test. There is a message hidden in this image. Find it, and it will lead you on the road to finding us. We look forward to meeting the few that will make it all the way through. Good luck.” He decided to try his luck, and couldn’t decipher it on the first try. So far, the hunt continues and has required knowledge of: classical music, cyberpunk literature, philosophy, number theory, Mayan numerology, and Victorian occult. At this point, no one knows what the Cicada 3301 challenge is, or who started it.
NSA Malware Infects More than 50,000 Computers All Over the World
According to a Dutch report, more than 50,000 computers worldwide have been infected with NSA operated malware. The software is hidden in certain computer networks that belong to organizations such as mobile operators all over the world, remaining dormant for years, eligible for activated at any time to collect personal data. The report says there are more than 1,000 hackers who work for a special department inside the agency known as Tailored Access Operations or TAO. The hackers had apparently infected 20,000 computers with this in 2008, but by mid-2012, the number had grown to 50,000.