Blue Brain β a tool or a crutch for humanity ?
What if human beings could better their brain, built across millennia through evolution? Gourav looks at the possibility of just such a technology and its implications.
We all think, act, react, ponder, decide, and memorize with the help of our brains. It is a very intriguing, interesting, and exciting part of our human body and contributes drastically to our human ecosystem.
It is also still a mystery as to how our brain, one of the most complex systems found in nature, functions.
Imagine an artificial copy of our human brain that can do the same without our help. If such a machine is created, then the boundaries between a human and a machine would grow thinner bringing to the fore its advantages and disadvantages.
The Brain and Mind Institute of Γcole Polytechnique FΓ©dΓ©rale de Lausanne in Switzerland did exactly that when they thought up a project called Blue Brain Project aimed at creating an artificial brain. This project was founded by Henry Markram in 2005.
What is Blue Brain Project?
The Blue Brain Project is bleeding-edge technology research that aims to reverse engineer a typical human brain into a computer simulation. Blue Brain can think, act, respond, make quick decisions, and keep anything and everything in its memory.
It means that a computer can act as a human brain taking artificial intelligence sky high. The simulations are carried out on IBMβs Blue Gene supercomputer, hence the term Blue Brain.
Why do we need this?
Today, we function based on our brainβs capability to respond to different situations. Some people make intelligent decisions and take actions as they have an inborn quality of intelligence. But this intelligence dies when we die. Imagine if such intelligence can be preserved to help the future generation.
A virtual or an artificial brain that can provide the required solution for the stated problem. Our brain tends to forget trivial things that mean more like birthdays, names of people, etc.
Such a brain can help us by storing this information and aiding whenever necessary. Imagine uploading ourselves onto a computer and living inside it.

How can this be made possible?
The information about the brain needs to be uploaded into the supercomputer to perform like a brain. So, retrieval or studying of this information is paramount. This can be made possible by using small robots called nanobots.
These bots can travel between our spine and brain to collect important data. These data contain necessary information such as the structure of the human brain, its current state, etc.
A human brain takes inputs from the sensor throughout the body, and it interprets these inputs to store in the memory or to respond to the desired output.
The artificial brain does a similar job by taking inputs from a sensory chip and it interprets these inputs by associating the input with the value stored in one of its registers which corresponds to different states of the brain.
The Blue Brain Project β Software Development Kit helps the users to utilize the data from the nanobots to visualize and inspect models and simulations. The SDK is a C++ library that is wrapped around Java and Python.
The Einstein Connection

When people think of genius, the list most assuredly includes Albert Einstein. For years, different scientific researchers have been trying to find the mystery behind his genius brain. Imagine if Einsteinβs brain could be recreated with the help of the Blue Brain Project. Many intriguing inventions and discoveries could be made. Such intelligence would shape many generations to come.β―
The Blue Brain Project has many merits such as non-volatile memory that can store anything and everything permanently, and the capability to make intelligent decisions without the presence of a person. This research can help in curing a lot of psychological problems.
If such technology comes to people, they would be dependent on these systems. This can open the door wide open for hack threats which can pose a real danger to people. People might be fearful of using such technology and it can culminate into large resistance.
The Authorβs Views
Intelligence is a quality that has always been associated with humans. Now artificially many intelligent systems and tools are available that aim to better peopleβs lives.
If Blue Brain technology reaches humans, everyoneβs life will be enriched.
But people might get too dependent on this technology which will culminate in catastrophic problems for the human psyche. However, if used properly this technology can add new layers to human life than being a replacement.
AI and human existence: The ABCs of ADLs
Explained: How even the simplest of day-to-day activities are deeply influenced by ML & AI. Will it become a life-changer?
On any given day, a regular human being does several activities which are performed ritually and without fail. From cleaning to eating and drinking and finding our way across our environments, human life involves many activities that are deemed Activity of Daily Living, or ADL. We have performed these activities in the past without any technological help or advice. Throughout human history, man has invented many a tool to improve the execution of these ADLs, and our current age is no different. Technologies such as βMachine Learningβ and βArtificial Intelligenceβ have enabled many advancements to our lifestyle. Some assist us, however there a few that we need to be cautious about.
Let us stride through these ADLs one by one by following a simple activity timeline of a personβs one-day life as we discover how Machine Learning is shaping human life.
Morning β 5 AM to 10 AM
A day for us typically starts with several activities. Brushing, eating, washing, etc., are a few morning routines that we follow in our day-to-day life.
A day begins by waking up from sleep. Nowadays smart devices such as wrist-fit bands, and smartwatches tell us more about our sleep. These devices take leverage of AI and Machine Learning to provide accurate results with improvement. They help us to improve our sleep quality and behavior which in turn improves our health.

After waking up, we essentially brush our teeth to maintain hygiene and dental wellness. Even in this activity with the help of novel smart wrist devices and smart toothbrushes which use AI and Machine Learning, we study and measure our hand movements, direction, speed, etc., that improve the quality of our brushing which in turns keep our oral health in check. An example of such an application is Oral B Genius X.
Nowadays, washing our hands regularly to maintain hygiene and immunity is very important especially given the COVID scenario around the globe. Many kinds of research have been made to take advantage of the technological development to help in monitoring hand hygiene and give a quality assessment to an individual. Many privatized hospitals have tied up with several industries to implement a smart solution for providing hand hygiene quality assessment. The doctors from these hospitals take advantage of it daily to improve their hygiene and their patientsβ as well. An example of such an application is The MedSense Clear system by the MIT Medlab Alumni.
Physical health and maintaining shape have become very underrated due to the new awareness around mental health and its importance. Nevertheless, staying in shape is a very important aspect of peopleβs lives as it indirectly constitutes mental well-being. Diet planning and eating healthy is something that must be taken care of. With the help of smart mobile and computer applications, we nowadays plan our diet efficiently. With the rise of βMachine Learningβ, this system is scrutinized, and further research is being conducted to find solutions for problems such as peopleβs preferences in their eating habits to provide an even better solution.
Mid-Day Activities β 10 AM to 3 PM
Mid-day activities constitute a very wide range of tasks. We regularly use map applications to commute to a certain location. These applications use AI and Machine Learning extensively to provide the best route possible by predicting traffic and other obstacles well before we commute. These applications suggest the best means of transport and the best route to take, they even track and alert us on breakdown of transport services. Examples of such applications are Google Maps, Apple Maps, etc.
Many people work in closed environments either in the office or at home. We are always sedentary, and desk bound. It becomes inevitable to take breaks and go for a short walk and stretch ourselves. And, equally important is to keep ourselves hydrated. With the help of smart devices, we can track the amount of time that we sit continuously. They help us to take a break or even correct our posture if required. Some also help us stay hydrated and suggest improvements based on the environment and atmosphere quality around us. Examples of such devices are Apple Watch, Mi Band, etc.
Evening Activities β 3 PM to 8 PM
Evenings are when we generally try to relax after work and indulge in leisure activities that differs from individual to individual. These activities involve a lot of AI and Machine Learning as it takes advantage of our data right from our preferences to our recent practices. These technology-driven applications and systems need to be handled with utmost caution. We all use the e-commerce facility extensively as it helps us to reduce the time and energy to buy a product as it enables us to shop from wherever we are. This has huge benefits. But we sometimes are ignorant and innocent about the implications that might come. Few applications read our technology usage colossally as they keep track of us more than we know. They improve their recommendation system using this data with the help of AI and Machine Learning and suggest products well before we want to search. If we are not using an official or a recognized application, we are at risk of a privacy breach with the history of our shopping data being stolen or hacked.

Social media applications have invaded our lives. We connect via different platforms to share, exchange ideas and also to relax. However, some of these applications hold sensitive data about us. These applications have plenty of recommendation systems that are constantly updated to feed posts enjoyable to us. But are we compromising on the sensitive data like our name, address, phone number, etc., as well as our preferences that reveal who we are while doing so? An imminent danger to watch out for here is βdata leakageβ. Some of these applications never encode or cipher our passwords. Other activities during the evening include working out, which a few people prefer in the morning too. With the prevailing COVID situation, we have restricted using the gym frequently. Many applications and systems have been created to assist us to work from home. With the help of AI and Machine Learning, they streamline our workout routine.
End Day Activities β 8 PM to 5 AM
End-day activities help us unwind as we call it a day. We perform certain activities as mentioned previously like eating, brushing, washing, etc. Some smart devices assist us by providing an alarm to indicate our sleeping time. This heavily depends upon technology as it tracks our previous sleep history to let us know in what areas we need to improve. These applications help us learn from our sleep pattern, like how much time we spent in deep sleep and so on. This system heavily uses AI and other sensors to read our breathing, heartbeat and measures those accurately to provide insights. Many wristwatches and fit bands provide this feature.
As we get to the end of it, these applications help us save energy and time as well as lead an enriching life.Having said that, we must also be cautious regarding their influence on us. Take precautions and double-check the application for privacy policies. Always use trusted applications, instead of randomly selecting one that might store unwanted cookies to store sensitive data which might lead to an imminent threat. So, whatβs your ADL?
In case you missed:
Securing Smart Cities and IoT devices
Smart Cities and IOTΒ are largely articulated buzzword in Digital transformation space. Digital transformation is good to have significant change towards betterment of human life style and βway of livingβ. Digital Transformation is broadly classified into exponential technology growth, Miniaturization, Virtualization and Linking Bio Technology with Information technology. The goal of digital transformation is towards the betterment of human life, one of the finest outcome of digital transformation is Smart City.Β IoT devices are the building blocks for the smart city. Smart Cities are becoming a reality, more than 80 cities across the globe are projected to be smart by 2025.Β Information Security plays a vital role in Smart City space towards safeguarding the higher levels of confidentiality, Integrity and Availability of the available services and automation process flow in the critical infrastructure, physical security, Transport, Telecommunication System, Government applications, Surveillance system and Inter connected alert mechanism.
IoT devices will obviously make your life easy, from your work place using your smart phone you can open your home door which is 40 Kms away from your geo coordinate. Even you can switch off your home AC, patrol your external sight of your home, get an alert if there is any smoke inside your home (Nest Labs). Even you can water your plant, weed your farm, plant your seed in your Farm house (Farmbot). Precise details about your heart beat zone, calories burn, your fitness information will be flashed in your smart phone screen with a help of a IoT band in your wrist. But there is a negative side too.
Albert Einstein had commented βTechnology growth is like the axe in the hands of pathological criminalβ Inorganic, uncontrolled technological growth without rationale will always paves way to the path of destruction. IOT and Smart city remains as Blue Ocean in terms of Business opportunity. The market remains untapped, New entrants, Start-ups are making floods of appliances and devices which are connected without a thought basis of Interconnections behind. Kaspersky Organization baptized IoT as βInternet of Crappy thingsβ
IoT devices are evolving without inbuilt security architecture, If the manufacturer designs the security architecture in a chip form and embeds in the IOT the Price becomes unaffordable, due to the market needs and business drivers, IoT devices are incarnated without the security chips, remains affordable and highly Vulnerable. In addition, the IoT devices are not properly tested in security aspects.Β A fitness band with lax security architecture in design will expose your personal, location and health related data to the internet world. An IoT Insulin pump and IoT pace maker security breach not only going to affect the confidentiality, but also affect the livability. Cherokee Jeep with a ECU OBD IoT devices had been hacked in United Kingdom and the cybercriminal taken the control of the Jeep and tried to crash the car. A Pace maker IoT device had been hacked and the hacker gained the access of IoT-pace maker and killed the victim. Those incidents triggers lexicographers to coin a new termΒ Cyber-Killing.
Hence the IoT devices call for additional human security perspective along with information security perspective and proves the triadic CIA approach is not suffice.Β Fourth factor of livability should be added to formΒ CAILΒ quartet (Confidentiality,Β Availability,Β Integrity,Β Livability), Since Digital transformation is playing role to linking Bio technology and Information Technology. Stern information Security control must be mandated for the IoT devices, else it will cannibalize the human life.
IoT devices are the building block of the smart cities. driver less train (IoT train), Driver less Tram (IoT tram, Driver less Cars (IoT Cars), Fire Alert system, Fire Suppression system, Water Supply system, All mode of transportation, Government Integrated Applications, Street Lighting System, Transport Control, Crime detection system. Everything will be integral part of Smart cities. The weakness in the IoT devices sums up and endanger the human life, If it is not architected well in Human security and Information Security aspects.
The IoT technologies exposes new risk and attack vectors like IoT Security-Side-channel Attacks, this type of attacks focus less on the information rather it focuses more on how the information is presented. βThe world is a dangerous place to live, not because of the people who are evil, but because of the people who donβt do anything about itβ Albert Einstein. Considering the challenges in this arena the IoT devices vendors, IoT Hardware manufactures, IoT Application developers must include Security Β Β (Authentication, Authorization and Encryption technologies ) in their designing phase, and Security Testing framework for IOT devices must be introduced. Furthermore, IoT Security compliant assaying should be mandated for all IoT devices.
Letβs aspire to have the secureΒ Smart citiesΒ built withΒ well-Engineered IoTΒ devices towards the objective of betterment in human way of living.





























































