Toggle light / dark theme

Chaotic circuit exhibits unprecedented equilibrium properties

Mathematical derivations have unveiled a chaotic, memristor-based circuit in which different oscillating phases can co-exist along six possible lines.

Unlike ordinary electronic circuits, chaotic circuits can produce oscillating that never repeat over time—but nonetheless, display underlying mathematical patterns. To expand the potential applications of these circuits, previous studies have designed systems in which multiple oscillating phases can co-exist along mathematically-defined “lines of .” In new research published in The European Physical Journal Special Topics, a team led by Janarthanan Ramadoss at the Chennai Institute of Technology, India, designed a chaotic circuit with six distinct lines of equilibrium—more than have ever been demonstrated previously.

Chaotic systems are now widely studied across a broad range of fields: from biology and chemistry, to engineering and economics. If the team’s circuit is realized experimentally, it could provide researchers with unprecedented opportunities to study these systems experimentally. More practically, their design could be used for applications including robotic motion control, secure password generation, and new developments in the Internet of Things—through which networks of everyday objects can gather and share data.

Google’s immersive Street View could be glimpse of metaverse

Fifteen years after its launch, a Google Maps feature that lets people explore faraway places as though standing right there is providing a glimpse of the metaverse being heralded as the future of the internet.

There was not yet talk of online life moving to virtual worlds when a “far-fetched” musing by Google co-founder Larry Page prompted Street View, which lets users of the company’s free navigation service see imagery of map locations from the perspective of being there.

Now the metaverse is a tech-world buzz, with companies including Facebook parent Meta investing in creating online realms where people represented by videogame-like characters work, play, shop and more.

NVIDIA Explains Why it Believes a Pixar-invented Protocol is the “HTML of the metaverse”

NVIDIA, one of the tech sector’s power players, is pushing the Universal Scene Description protocol as the foundation of interoperable content and experiences in the metaverse. In a recent post the company explains why it believes the protocol, originally invented by Pixar, fits the needs of the coming metaverse.

Though the word metaverse is presently being used as a catchall for pretty much any multi-user application these days, the truth is that the vast majority of such platforms are islands unto themselves that have no connectivity to virtual spaces, people, or objects on other platforms. The ‘real’ metaverse, most seem to agree, must have at least some elements of interoperability, allowing users to seamlessly move from one virtual space to the next, much like we do today on the web.

To that end, Nvidia is pushing Universal Scene Description (USD) as the “HTML of the metaverse,” the company described in a recent post.

FBI: Hackers increasingly exploit DeFi bugs to steal cryptocurrency

The U.S. Federal Bureau of Investigation (FBI) is warning investors that cybercriminals are increasingly exploiting security vulnerabilities in Decentralized Finance (DeFi) platforms to steal cryptocurrency.

“The FBI has observed cyber criminals exploiting vulnerabilities in the smart contracts governing DeFi platforms to steal investors’ cryptocurrency,” the federal law enforcement agency said.

“The FBI encourages investors who suspect cyber criminals have stolen their DeFi investments to contact the FBI via the Internet Crime Complaint Center or their local FBI field office.”

FBL69: David Weinberger — Using Technology To Thrive in Chaos

This week our guest is author and technologist, David Weinberger, who has spent years lecturing at Harvard as well as acting as a fellow and senior researcher at the renowned Berkman Klein Center for Internet & Society. And just prior to covid, David released his latest book, Everyday Chaos: Technology, Complexity, and How We’re Thriving in a New World of Possibility. In this episode, David and I explore some of the key ideas he focused on in Everyday Chaos. This includes looking at the ways in which we have historically used reductionist thinking to make generalizations for society, products, and technology, and how the latest technologies like the internet and Machine learning are revealing how much more we can thrive when we embrace chaos and customization. This means letting individuals and data tell us what people want by exploring all the possibilities rather than attempting to predict and shape outcomes beforehand.

** Find out more about David at his website weinberger.org and buy his book at everydaychaosbook.com.

55 MINS

NTT unveils what it calls the ‘first edge and private 5G’ service

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

In today’s enterprise, even just a split second in latency can impact performance and access to data — and, thus, the ability to manage and immediately act on it.

But the physics and costs of multicloud and hybrid cloud environments make near-instantaneous response times all but impossible.

Satellite hackers can see every email you get

Modern satellites are becoming a collection of mass-produced computers floating in space. By the end of the decade, thousands more will be out there. But with the increasing reliance on orbital technology comes a growing appetite for hacking it.

Data relayed via satellites is not immune to hacking. James Pavur, an Oxford PhD focusing on satellite systems security, has proven the above statement to be disturbingly evident. With his team, he used $300 worth of satellite TV equipment to intercept vast amounts of information distributed along the larger part of the Northern hemisphere.

“When you’re eavesdropping on satellite internet signals, you’re effectively seeing what someone’s ISP would see. You see every website that a customer browses to, or every email that they receive for every account that they own,” Pavur told CyberNews.

/* */