An article published in the journal “Computers & Geosciences” describes a research into the possibilities of combining artificial intelligence, Twitter and what is called citizen science to create early warning systems for flood-prone communities. A team of researchers from the British University of Dundee led by Roger Wang worked to create solutions that can detect as quickly as possible the first signs of danger to activate countermeasures.
Blogs about Internet
The new “Backyard Worlds: Planet 9” initiative by NASA and various American institutions along with the Zooniverse platform was announced to allow anyone connected to the Internet to participate in the search for the ninth planet of the solar system. You can connect to the project’s website, examine images captured by the WISE space telescope and report any moving objects.
Google announced its own platform for the Internet of Things, called Android Things. In fact, it’s Brillo project, introduced in May 2015, in which the company included several new features requested by the developers who had the opportunity to test it. The presence of the Weave communication protocol is confirmed.
At the Watson Developer Conference held in San Francisco, IBM announced Project Intu, a new platform designed to make its Watson cognitive computing system accessible from any device. Launched for now in an experimental version, it gives developers who have a Bluemix account to have access to Watson Intu Gateway and create applications using Watson using the SDKs provided as free software through Watson Developer Cloud, Intu Gateway and GitHub.
A few days after the attacks incredibly massive attacks suffered in two stages by Dyn, a provider of Internet service including the DNS management, information, estimates on affected devices and theories on the potential culprits keep on arriving. Very high profile sites such as the social networks Twitter and Reddit, famous online services such as e-Bay, Netflix and Spotify and other sites have been hit more or less hard. The involvement of many devices for the Internet of Things shows how their security is too often non-existent.