Protection Algorithm: The Other Side of Algorithm


Introduction about Protection Algorithm





We are going to discuss protection algorithm today and how it affects our data? The concern about the protection of our data is well founded, but who can protect us from malevolent use is also the algorithm. An algorithm (protection algorithm) decides the proposals that Google offers you before a search, knowing from previous experience what really interests you; another selects the entries that appear on your Facebook wall and silences others and suggests possible friendships; a third party recommends books, music and products as soon as you check out the Amazon website. Tripadvisor knows what kind of vacation you like, e-dreams where you usually travel and the automatic corrector changes what you write because sometimes you know what you want to say, and your personal assistant reminds you that you have not called your mother for days . All that, and everything else, is ruled by his majesty the algorithm.





This ubiquitous word, which was born as a recognition of the Arabic mathematician Al-Khwarizmi, whose work came to the West through Spain, also evokes a threat. In the information age, we are increasingly aware of the importance of protecting our data. With some frequency, the media tell us some perverse uses of the information we accumulate through information technologies and their tools. Algorithms (protection algorithm) govern computer programs, search engines and social networks, smartphone apps and databases where we have signed. We suspect that with the algorithm in hand we are kept under close surveillance by anonymous centers of power, to the point of knowing ourselves better than ourselves. The concern is based, Beyond technology, with its face and its cross, the algorithms have a vast positive and unsuspected face, because it is behind the advances of medicine, weather forecasts, environmental management of nature, logistics that supplies us with the goods we need, the productive processes, traffic control, television programming and the ups and downs of the markets. 





The algorithms have allowed the appearance of striking applications such as virtual assistants such as Alexa, Cortana or Siri; those who suggest a possible partner, those who make animated films possible, help you invest in stock exchange, translate languages ​​in real time, advise you on all types of purchases, from trips to insurance, answer your phone calls, measure your physical activity or control the operation of household appliances in your home. And almost anything that comes to mind.





In fact, the algorithm (protection algorithm) is neutral, it is only the formalization of the different steps of a process to solve a mathematical problem that models a real event. They are orderly instructions waiting for you to insert an input to generate an answer. The question may be: what dose of this drug should a certain patient take? How should I regulate the exposure time of the scanner? Is it necessary to alert or even evacuate this area due to the risk of a natural disaster? How many minutes will the next bus arrive? The input can be any operation you do with your mobile, from sending a whatsApp, doing an operation with the calculator, turning a page in the document that I am reading, or telling Siri that I want to listen to a song. It is a tool such as a screwdriver or a knife.







Applied mathematics deals with all this, which converts data and algorithms into knowledge, in order to make appropriate decisions, in improvements and innovations in industrial or daily processes or in alerts of possible risks, from those affecting health. even those that derive from a natural catastrophe.





Final Words





Spain will be in a few weeks the stage where all that applied mathematics will be shown to the world. The International Congress of Industrial and Applied Mathematics (ICIAM) is the world's largest event in its field. It is celebrated every four years since 1987 and it is the first time it has arrived in our country. Nearly 4,000 specialists from all over the world will attend to tell us what new applications they have achieved or are developing. Mathematics is the engine of the industrial revolution of the 21st century, which is transforming the world by providing the intelligence that hides behind the constant and amazing advances of technology, which is building the future. Thanks for reading visit this link to read more about technology.


COMMENTS

Name

Atletico Madrid,1,Barcelona,2,Business,1,Coronavirus,2,Cristiano Ronaldo,4,Dortmund,1,Ethical Hacking,46,Exploitation,35,Featured,8,Football,19,Footprinting,29,Google Adsense,2,Juventus,1,Kali Linux,39,Kali NetHunter,3,LaLiga,2,Liverpool,1,Make Money,3,Manchester United,1,Metasploit,1,Offensive Security,17,Penetration Testing,15,Politics,2,Post Exploitation,19,PSG,1,Real Madrid,1,Search Engine Optimization,4,Sports,1,Technology,36,Tips,16,Trending,236,UEFA Champion League,2,UEFA Europa League,1,United States,1,Windows,7,World News,7,
ltr
item
My Hack Stuff: Protection Algorithm: The Other Side of Algorithm
Protection Algorithm: The Other Side of Algorithm
My Hack Stuff
https://www.myhackstuff.com/2019/06/protection-algorithm-other-side-of.html
https://www.myhackstuff.com/
https://www.myhackstuff.com/
https://www.myhackstuff.com/2019/06/protection-algorithm-other-side-of.html
true
1336489415246004999
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content