New diagnostic tools leverage the power of Artificial Intelligence. Too Much Data to Process By 2030 all Baby Boomers will be over 65, which means that health-related issues become more and more top-of-mind for this aging population. Regular cancer screenings are one of these concerns. The sheer volume of such screenings already taxes existing healthcare systems. However, laboratories, diagnostic technicians, and healthcare providers are using powerful new technological tools to aid them in the work of helping patients live happier & healthier lives. One such tool is Artificial Intelligence, commonly referred to as AI. Unlike its counterparts depicted in the movies as sentient neural networks whose sole purpose is to destroy humanity, real AI has been a computing and data processing resource staple for decades. AI is as quotidian as the electric power grid and supermarkets. Everything from predictive weather modeling to aid meteorologists to CAD-based generative design for engineers, AI has proven to be a powerful tool for many industries in an everyday capacity. In the case of healthcare, data modeling and data processing have become synonymous with AI-driven environments capable of handling such massive volumes. Take for example liquid biopsies to better predict infant cancers. The data associated with these tests are referred to as high-throughput data. Making connections is essential between high-throughput data on orders of magnitude within a smaller outcome sample space of patient responses. The results of these AI-driven computations expedite determinations on whether or not they have cancer. Statistical models are useful for summarizing and describing variations to predictive models, and machine learning AI leverages these summaries that can make for more useful predictions, as seen above. Imaging for Data Collection and AI Processing From X-Rays, to CT (CAT) Scans, to MRIs, in vivo imaging technology has been one of the most powerful medical...
data
-
-
Blockchain described in one sentence: A blockchain is really a kind of database that’s shared across loads of different computers that are each running the same software; each bit of data is secured using some complicated bits of cryptography that means that only people that are meant to be adding to or editing the data can do that job. WIRED Magazine, 2018 Recently, I had a job interview with a company that builds their business model on providing add-on services for their customers’ databases built upon the open source centralized DB platform known as PostgreSQL. Probably the reason why I was considered to do digital copywriting for them is my previous experience writing for tech companies like PTC, Satcon, and L-1 to name a few. For PTC, I did a ton of writing for their PLM Product Marketing Group. PLM (i.e. product lifecycle management) is a massive technology platform and manufacturing methodology that relies heavily on data-driven digital thread content, product data management, and databases to name a few. So as you can see, I know a thing or two about databases. Also, I have written about Blockchain Technology (or BlockTech as I will be using this portmanteau from now on) in the past; therefore, I am well aware of the hot new trends for this distributed cutting-edge decentralized data-repository/processing platform. During the interview, I asked a simple question: How is your approach to utilizing a centralized DB value-add over the hot new decentralized DB technology trend known as Blockchain? Digital Batman’s Alter Ego, Nick, 2021 Needless to say, the developer that I was interviewing with did not really like the question all that much. His answer was more defensive rather than enlightening: “…centralized DBs are not going away anytime soon, so people need to understand that Blockchain is more like a curiosity right...
-
February 17, 2021Recently, the US Department of Justice levied an indictment against three North Korean military hackers for their role in cyber-related crimes (see video below). These included (but not limited to): Targeting of and Cyberattacks on the Entertainment Industry: Such as the destructive cyberattack on Sony Pictures Entertainment in November 2014 in retaliation for the farcical movie The Interview. Cyber-Enabled Heists from Banks: Attempts to steal more than $1.2 billion from banks in Vietnam, Bangladesh, Taiwan, Mexico, Malta and Africa. Creation and Deployment of Malicious Cryptocurrency Applications: Development of multiple malicious cryptocurrency applications including Celas Trade Pro, WorldBit-Bot, iCryptoFx, Union Crypto Trader, and more, which would provide the North Korean hackers a backdoor into the victims’ computers. Spear-Phishing Campaigns: Multiple spear-phishing campaigns that targeted employees of United States cleared defense contractors, energy companies, aerospace companies, technology companies, and more. Ransomware and Cyber-Enabled Extortion: Creation of the destructive WannaCry 2.0 ransomware in May 2017, and the extortion and attempted extortion of victim companies involving the theft of sensitive data and deployment of other ransomware. And it is to that last point that I thought a brief discussion on Ransomware would be warranted. Even Digital Batman’s own father was a victim of a ransomware attack that left him $400 poorer! In 2019 over 187.9 million users were affected by this bold malicious threat to online activities such as web‐surfing, e-commerce, gaming, and more. Put simply, this highly‐disruptive form of Internet‐viral malicious software (malware for short), not only infects your computer but holds all of your most precious files (i.e. photos, documents, apps, etc.) completely hostage—via permanently encrypting such files—until the victim is forced to pay a “ransom” to the criminal entity behind the attack for a decryption key to unlock the files. Usually to the tune of $100 ‐ $400 or more for...
-
January 24, 2020Google recently announced that it was going to strip cookies from its Chrome web-browser. This is a big deal for a lot of people, namely advertisers. In case you weren’t aware of what a cookie is (not the yummy kind you eat), let Digital Batman tell you. A cookie is a bit of third-party data that gets stored on your system when you access a website. This data is used to track your online activities such as product browsing history, location, etc. Advertisers can then use this data to target ads specifically to what they think you’re interested in. And furthermore, advertisers can “retarget” ads after you as you browse around the Internet from site to site. Ever wonder how a random website you visit seems to know that you were looking at plushy chairs on Amazon? Well, that’s retargeting and that’s powered by cookies. Which leads to a lot of privacy issues that have been debated for as long as the Internet has been around. Therefore, Google is trying to assuage users’ concerns about privacy by eliminating cookies. What will advertisers do? Well, they’ll probably have to come up with more transparent ways to gather your information, with your permission. Now I mention this because it reminds me about how things have both changed and remained the same over the last 25+ years of browsing the Internet. Back in the heyday of the World Wide Web (mid-to-late 1990s), we had a whole battlefield of web browsers all vying for dominance in The Browser Wars! It all started with Netscape Navigator (technically Mosaic in its initial form), invented by Marc Andreessen founder of Netscape. [Digital Batman had done a previous Progressive Pioneers profile on Andreessen back in July.] Navigator was initially released in December of 1994. It sported a simple interface with a few oversized navigation buttons (like Back, Home, and...
-
April 20, 2017Mobile communications such as text messaging, Facebook Messenger, Twitter Direct Messaging, SnapChat, Skype, and FaceTime are all seeking to supplant Email these days as the preferred form of digital communications. Not so for business or for professionals where Email still reigns supreme. Email access essentially comes in two forms: Email Software, or Client-based Email – E.g. Microsoft Outlook (costly subscription fees), Mac Mail (comes with Mac OS X), and Thunderbird (free open-source download) to name a few. Cloud Email – E.g. Google Mail (GMail), Yahoo Email, or AOL Email (yes, it still exists)—all free and accessible via a web browser Let’s delve into the key differences between them with an eye on how each form manages Email in their own unique ways. It should be noted that regardless of what method of accessing your Email is used, all Email actually sits on a server somewhere in “The Cloud” and simply waits for you to get it one way or another. Email Software Client-based (meaning: on your computer) Email still has many years of unparalleled usefulness that other services can’t match—the main advantage being security. Say you’re an employee at Company X and check your email like everyone else does everyday. You can rest assured that the Email sitting behind your company’s firewall is as secure as it gets. Even when logging in from home, you are usually using a VPN (Virtual Private Network) to establish a secure connection between your laptop and your company’s Email servers. There’s very little chance of your Email being hijacked as you send your messages to your fellow employees or out to your clients. Microsoft Outlook allows a massive amount of Email filtering features, rich text (like HTML) messages, Email organization into shared and group folders across the entire organization, remote Email access via a Web-Outlook interface, and comes in cross-platform versions for Mac OS X and Windows (all versions). And the final advantage is group organization capabilities like employee calendars, scheduling...