Posts

C3L - Meet the team!

Introduction to the people behind this blog!This blog is where members of C3L post about current projects, spread a bit of information, and write about their personal interests in order to create a wider outreach. 
The blog has three main authors contributing: Scott (the director of the company), Alex (researcher and co-developer), and Grace (Research assistant for the company.) The purpose of this post is to officially introduce each of us as individuals in order to give a small insight into who we are and what we're like at C3L as people. Firstly introducing, Scott: I'm Scott, I started the company to take advantage of an opportunity to work in standards way back in 1995 and have managed to keep my hand in since. My background is in engineering and I've been doing it since leaving school and university. I'd like to think I'm good at it, taking a holistic systems view to things and looking into why they aren't secure and then trying to find ways to fix things.…

The Scourge of Phone Spoofing

IntroductionA trend which keeps increasing and sees people receive unwanted calls and messages is caller-id spoofing. Number spoofing is when someone fakes outgoing caller ID info to show a number that isn’t theirs. The spoofed number often belongs to a real person or business, but not to the person using it to call you.
A common strategy is neighbour spoofing, which is when the caller displays a number with your area code so that you’re more likely to pick up. Scammers will even spoof the numbers of legitimate government agencies, banks, and insurance providers to fool people into paying fraudulent fees or revealing sensitive information. The spoofers goal is  to make a profit by dishonest means.There are difficulties in presenting caller-id spoofing because it is not illegal as there legitimate use cases of it. There are situations when number spoofing is arguably necessary, or at least understandable. For example, a doctor might display their office number when they need to make pro…

IET - AI and Sports Webinar Notice

This webinar hosted by IET on AI and Sport I believe is worth checking due to the useful insights and information it provides. The speakers discuss Artificial Intelligence (AI) is now becoming pervasive in everyday life, including being incorporated in smartwatches to encourage better health in everyday people. Yet many of these devices are unused and put in a drawer because they need charging or don’t look as good as real watches. They ask how can we address this in wearables?

The use of AI in sports is seen in recruiting, training, performance analysis, maintaining health and fitness and even broadcasting and advertising. More controversial questions arise when we consider whether AI could help us become faster, stronger or lighter. The talk examines is it possible for AI to turn us into athletes? And if we are already an athlete, can it make us win?

This webinar investigates the principles of peak performance:
How can AI make us stronger and faster? Will AI allow humans to break world…

The Landscape of the Splinternet

Introduction
This post will examine the different landscapes of the splinternet as how I roughly understand as they exist. These are my thoughts and opinions on the matter of the splinternet so please undertake further reading on this topic if it piques your interest. Why this topic is at times intricate to discuss because the current climate surrounding control and access to applications and services through the internet is slowly becoming more complicated. The landscape of the splinternet I will be talking include the Cultural and social (language), Regulatory and Nation-State. Also, I will suggest a couple of things about what could do about it its implications. 
Cultural and Social Splinternet
I have written about Language and the splinternet before so will only provide a brief reminder. With the cultural and social splinternet as the barriers across cultures with media and language being two defining features. These naturally exist in the physical world (nation-state) because of how…

Overview of ETSI Standards Development Process

Introduction
This post aims to share information about the ETSI Standards development process to people who are unfamiliar with the work ETSI does. Also, I add my own insights from my experience of the work at ETSI though it is limited at the moment but should still prove useful.
Steps
The objective of the ETSI Standards Making Process (SMP) is to convert market needs for standardisation in the ICT area into ETSI deliverables (specifications, standards, norms, guides, reports) used in the market place.The input to the process is an existing (as yet known or unknown) market need for standardization. The output is the broad application of the produced deliverables in the market place.The SMP consists of several elements with their own distinct objectives, inputs and outputs. Each process is defined to the level of which operational tasks are performed, and wherein the ETSI organisation they are performed.The whole ETSI organization is in one way or the other involved in either operation of…

Personal Interest - Voyager Space Program

Image
Introduction
I have always been fascinated by and interested in the Voyager space probes. They greatly expanded our knowledge of our solar system from the four gas giants of Jupiter, Saturn, Uranus and Neptune to their continuing scientific mission which have revealed the boundaries of solar system and the start of interstellar space.  
Goals
The twin spacecraft Voyager 1 and Voyager 2 were launched by NASA in separate months in the summer of 1977 from Cape Canaveral, Florida. As originally designed, the Voyagers were to conduct closeup studies of Jupiter and Saturn, Saturn's rings, and the larger moons of the two planets. To accomplish their two-planet mission, the spacecraft were built to last five years. But as the mission went on, and with the successful achievement of all its objectives, the additional flybys of the two outermost giant planets, Uranus and Neptune, proved possible -- and irresistible to mission scientists and engineers at the Voyagers' home at the Jet Propuls…

Cyborg Anthropology

Introduction
The term cyborg anthropology was first described in a paper from 1995. They viewed cyborg anthropology as bringing cultural anthropology of science and technology into conversion with established activities in science and technology studies plus feminist studies of science, technology and medicine. By calling attention more generally to the cultural production of human distinctiveness by examining ethnographically thee boundaries between humans and machines along with and what constitutes the boundaries between them. This post will aim to give an overview of the area and its usefulness in studying human-computer interactions. Though this means all devices not just traditional  computers so smartphones, tablets, IoT devices etc. In short cyborg anthropology aims to combine grounded research on human-technology interactions with an openness to speculation and imagination.
Use & Purpose
Like all anthropologists, a cyborg anthropologist will watch or study people (living or …