Menu

Blog

Archive for the ‘internet’ category: Page 247

Aug 13, 2018

Solar-powered aircraft stays aloft for record-breaking 25 days

Posted by in categories: drones, internet, satellites, surveillance, sustainability

While Facebook and Google recently pulled the plug on their solar-powered internet drones, another company with a lot more experience is having success with the idea. Airbus announced that its solar-powered Zephyr S HAPS (high altitude pseudo-satellite) flew for 25 straight days, setting a time aloft record for any airplane, ever. It shattered the previous record of 14 days, marked by a previous prototype Zephyr aircraft.

The Zephyr flies on sun power alone at over 70,000 feet, an altitude that just a few aircraft like the Concorde and SR-71 Blackbird have reached. That’s well above any weather, and lets it perform reconnaissance, surveillance and communications/internet duties. “[It fills a] capability gap complimentary to satellites, UAVs and manned aircraft to provide persistent local satellite-like services,” Airbus said in a press release. A video of the takeoff (below) shows that it can be lifted and launched by hand. Once aloft, it can be operated for a fraction the cost of a satellite.

Continue reading “Solar-powered aircraft stays aloft for record-breaking 25 days” »

Aug 6, 2018

AI vs. God: Who Stays and Who Leaves?

Posted by in categories: internet, robotics/AI

Scientific progress, and Internet and mobile coverage proliferation in the last 8 years alone might have decreased the numbers dramatically. Still not as much as to liquidate the spiritual beliefs of the vast majority of the world’s population.


Does God exist? If She does, this is how we got our sacred soul. If She does not, we will soon be able to recreate the soul in machines!

Read more

Aug 4, 2018

How will Bitcoin Work When Mining Rewards Run Out?

Posted by in categories: bitcoin, cryptocurrencies, economics, internet

Let us frame the question, by reviewing what miners really do…

Miners play a critical role in the Bitcoin network. Their activity (searching for a nonce) results in assembling an immutable string of blocks that corroborate and log the universal transaction record. They are the distributed bookkeepers that replace old-school banks in recording and vouching for everyone’s purchase or savings.

From the perspective of a miner, there is no obvious connection between their activity and the worldwide network of bitcoin transactions and record keeping. They are simply playing an online game and competing against thousands of other miners in an effort to solve a complex and ongoing math problem. As they arrive at answers to small pieces of the problem, they are rewarded with bitcoin, which can be easily translated into any currency.

What is the Problem?

Continue reading “How will Bitcoin Work When Mining Rewards Run Out?” »

Aug 1, 2018

These Filipinos Believe The Earth Is Flat (And The Internet Isn’t Having It)

Posted by in category: internet

Stay in school kids… hahaha.


Stay in school, kids.

Read more

Aug 1, 2018

Futurists in Ethiopia are betting on artificial intelligence to drive development

Posted by in categories: encryption, government, internet, mobile phones, robotics/AI, surveillance

“We should not start from steam and railways, or the old technologies—that is already done,” Assefa argues.

That makes sense to academics like Singh — though he also cautions that political forces are often slow to see the bigger picture. There is definitely an opportunity for developing countries, he says. “But any time we have a technological revolution, the political institutions have to catch up.”

A 2017 report (pdf) by the World Wide Web Foundation suggested that Ethiopian “intelligence services are using machine intelligence techniques to break encryption and find patterns in social media posts that can be used to identify dissidents.” And while mobile phone and internet penetration in Ethiopia is comparatively poor—a situation made worst amid widespread anti-government protests, which prompted an internet crackdown in February — the report added that government surveillance and oppression could increase as the use of smartphones expands.

Continue reading “Futurists in Ethiopia are betting on artificial intelligence to drive development” »

Jul 30, 2018

These 9 Incredible Images Are a Mind-Boggling Remind of How Far Technology Has Come

Posted by in categories: computing, internet, mobile phones, quantum physics

Sometimes, while waiting for quantum computers to become a thing, or complaining that your stupid laptop keeps dying on 5 percent battery, it’s easy to forget just how far technology has come over the past 50 years.

Sure, we can all list off a whole bunch of innovations that have changed the way the world works — the Internet, smartphones, radio telescopes — but it’s hard to really put that kind of change into perspective.

Thankfully, pictures often speak louder than words, and so below are nine photos that’ll make you stop and raise your *praise hand* emojis to the sky in honour of the scientists and engineers that have got us where we are today.

Continue reading “These 9 Incredible Images Are a Mind-Boggling Remind of How Far Technology Has Come” »

Jul 28, 2018

4 Billion New Minds Online: The Coming Era of Connectivity

Posted by in categories: 3D printing, internet

As 5G electrifies a world of trillions of sensors and devices, we’re about to live in a world where anyone anywhere can have access to the world’s knowledge, crowdfund ready capital across 8 billion potential investors, and 3D print on the cloud.

And as the population of online users doubles, we’re about to witness perhaps the most historic acceleration of progress and technological innovation known to man.

Abundance Digital Online Community: I have created a digital/online community of bold, abundance-minded entrepreneurs called Abundance Digital. This is my “onramp” for exponential entrepreneurs—those who want to get involved and play at a higher level. Click here to learn more.

Continue reading “4 Billion New Minds Online: The Coming Era of Connectivity” »

Jul 23, 2018

Xage secures $12 million Series A for IoT security solution on blockchain

Posted by in categories: bitcoin, internet, security

Xage (pronounced Zage), a blockchain security startup based in Silicon Valley, announced a $12 million Series A investment today led by March Capital Partners. GE Ventures, City Light Capital and NexStar Partners also participated.

The company emerged from stealth in December with a novel idea to secure the myriad of devices in the industrial internet of things on the blockchain. Here’s how I described it in a December 2017 story:

Xage is building a security fabric for IoT, which takes blockchain and synthesizes it with other capabilities to create a secure environment for devices to operate. If the blockchain is at its core a trust mechanism, then it can give companies confidence that their IoT devices can’t be compromised. Xage thinks that the blockchain is the perfect solution to this problem.

Continue reading “Xage secures $12 million Series A for IoT security solution on blockchain” »

Jul 23, 2018

Ytterbium: The quantum memory of tomorrow

Posted by in categories: encryption, internet, quantum physics, security

Quantum communication and cryptography are the future of high-security communication. But many challenges lie ahead before a worldwide quantum network can be set up, including propagating the quantum signal over long distances. One of the major challenges is to create memories with the capacity to store quantum information carried by light. Researchers at the University of Geneva (UNIGE), Switzerland, in partnership with CNRS, France, have discovered a new material in which an element, ytterbium, can store and protect the fragile quantum information even while operating at high frequencies. This makes ytterbium an ideal candidate for future quantum networks, where the aim is to propagate the signal over long distances by acting as repeaters. These results are published in the journal Nature Materials.

Quantum cryptography today uses optical fibre over several hundred kilometres and is marked by its high degree of security: it is impossible to copy or intercept information without making it disappear.

However, the fact that it is impossible to copy the signal also prevents scientists from amplifying it to diffuse it over long distances, as is the case with the Wi-Fi network.

Read more

Jul 20, 2018

Team suggests a way to protect autonomous grids from potentially crippling GPS spoofing attacks

Posted by in categories: biotech/medical, cybercrime/malcode, drones, engineering, internet, robotics/AI

Not long ago, getting a virus was about the worst thing computer users could expect in terms of system vulnerability. But in our current age of hyper-connectedness and the emerging Internet of Things, that’s no longer the case. With connectivity, a new principle has emerged, one of universal concern to those who work in the area of systems control, like João Hespanha, a professor in the departments of Electrical and Computer Engineering, and Mechanical Engineering at UC Santa Barbara. That law says, essentially, that the more complex and connected a system is, the more susceptible it is to disruptive cyber-attacks.

“It is about something much different than your regular computer virus,” Hespanha said. “It is more about cyber physical systems—systems in which computers are connected to physical elements. That could be robots, drones, smart appliances, or infrastructure systems such as those used to distribute energy and water.”

In a paper titled “Distributed Estimation of Power System Oscillation Modes under Attacks on GPS Clocks,” published this month in the journal IEEE Transactions on Instrumentation and Measurement, Hespanha and co-author Yongqiang Wang (a former UCSB postdoctoral research and now a faculty member at Clemson University) suggest a new method for protecting the increasingly complex and connected power grid from attack.

Continue reading “Team suggests a way to protect autonomous grids from potentially crippling GPS spoofing attacks” »