Toggle light / dark theme

Got visitors coming in 2 days to check out your IT operations and need a data center popped up quickly to show off in front of the potential customers; well, now you can do it in 29 hours.


Defense team sets up AI-based security for the Cyber Grand Challenge.

The US Defense Advanced Research Projects Agency (DARPA) has knocked up a small, liquid cooled data center in just 29 hours ahead of the Cyber Grand Challenge (CGC).

I know so many people who will benefit from this.


During the 2014 FIFA World Cup opening ceremony, a young Brazilian man, paralyzed from the chest down, delivered the opening kickoff. He used a brain-machine interface, allowing him to control the movements of a lower-limb robotic exoskeleton.

This unprecedented scientific demonstration was the work of the Walk Again Project (WAP), a nonprofit, international research consortium that includes Alan Rudolph, vice president for research at Colorado State University, who is also an adjunct faculty member at Duke University’s Center for Neuroengineering.

Barely two years after the demonstration, the WAP has released its first clinical report, published Aug. 11 in Scientific Reports. They report that a group of patients who trained throughout 2014 with the WAP’s brain-controlled system, including a motorized exoskeleton, have regained the ability to voluntarily move their leg muscles and to feel touch and pain in their paralyzed limbs. This, despite being originally diagnosed as having a clinically complete spinal cord injury — in some cases more than a decade earlier.

Eight completely paralysed people have regained function in their limbs following virtual reality training, in an accidental result that has astonished even the scientists involved.

Using a brain-machine interface, scientists showed that people with long-term severe paralysis could retrain the few remaining connections in their damaged spines, letting their brains talk to their extremities once more. This enabled them to feel sensation, move their limbs and improved their bladder and bowel control.

The results came about as a wholly unexpected side effect of training to help people use robotic exoskeletons, which let them walk upright.

Read more

This is a comprehensive and critical write-up on some of my policies by some leading researchers and thinkers. It’s from the magazine website of the IEEE, the world’s largest professional organization devoted to engineering and the applied sciences. Naturally, people in the field of science and engineering are some of the most difficult to please, since they are such critical thinkers (which is precisely why I like them so much):


When a transhumanist runs for president, what does that mean for society?

Read more

1™, the world’s first commercial interplanetary mining mission, will fly to and rendezvous with a near-Earth asteroid to determine its value as a source of space resources. The destination asteroid will be chosen from a group of top candidates selected by the world renowned team of asteroid experts at Deep Space Industries.

Once the spacecraft arrives at the asteroid, the autonomous spacecraft will map the surface and subsurface, taking visual and infrared imagery and mapping overall water content. With the initial science campaign complete, Prospector-1 will use its water thrusters to gently touch down on the asteroid, measuring the target’s geophysical characteristics.

Prospector-1 is a small spacecraft that strikes the ideal balance between cost and performance. In addition to radiation-tolerant payloads and avionics, all DSI spacecraft notably use the Comet line of water propulsion systems, which expel superheated water vapor to generate thrust. Water will be the first asteroid mining product, so using water as propellant will provide future DSI spacecraft with the ability to refuel in space.

Read more

Glad folks realizes and admit to the risks; however, I stand by my argument until the underpinning technology is still tied to dated digital technology; it will be hacked by folks like China who are planning to be on a new Quantum network and platforms. Reason why all countries must never lose sight of replacing their infrastructure and the net with Quantum technology.


A team of researchers from Pittsburgh has won DARPA’s Cyber Grand Challenge – a competition billed as the ‘world’s first automated network defense tournament.’ The implications for the Internet of Things (IoT) are grave, as the machines on display threaten to ravage the already flaky state of IoT security.

DARPA, the Department of Defense’s (DoD) Defense Advanced Research Projects Agency, is a wing of the US military that investigates how the latest technological breakthroughs can be put to use on the battlefield. With nation-state cybersecurity now declared a new front in conventional warfare, militaries around the world will be flocking to gather the tools needed to exert force in this new medium.

So while the DARPA competition presents itself as a smiley affair, it dies represent the new face of an emerging weapon – and the most promising weapon on display came from the aforementioned ForAllSecure, a startup with close ties to Pittsburgh’s Carnegie Mellon University.

Many folks have voiced the concerns over autonomous autos for many legitimate reasons including hacking and weak satellite signals for navigation especially when you review mountain ranges of the east coast.


The world has witnessed enormous advances in autonomous passenger vehicle technologies over the last dozen years.

The performance of microprocessors, memory chips and sensors needed for autonomous driving has greatly increased, while the cost of these components has decreased substantially.

Software for controlling and navigating these systems has similarly improved.

LAS VEGAS, Nev. — Mayhem ruled the day when seven AIs clashed here last week — a bot named Mayhem that, along with its competitors, proved that machines can now quickly find many types of security vulnerabilities hiding in vast amounts of code.

Sponsored by the Defense Advanced Research Projects Agency, or DARPA, the first-of-its-kind contest sought to explore how artificial intelligence and automation might help find security and design flaws that bad actors use to penetrate computer networks and steal data.

Mayhem, built by the For All Secure team out of Carnegie Mellon University, so outclassed its competition that it won even though it was inoperable for about half of the contest’s 96 270-second rounds. Mayhem pivoted between two autonomous methods of finding bugs and developing ways to exploit them.

Read more

I already voiced my concerns of this technology in the hands of criminals and terrorists. If we can have it so can others. Only when QC and a Quantum net is in place will we be truly protected with bots.


Cybersecurity could soon be another place where bots become invaluable for experts. DARPA recently organized The Cyber Grand Challenge, where computer algorithms showed how easy it is to clean up vulnerabilities in code written by humans. ( DARPA )

The Cyber Grand Challenge took place under DARPA patronage, and it is good to see how preoccupied the U.S. Department of Defense is with cybersecurity.

The event pitted computers against each other in an attempt to uncover which one can best fulfill the tasks of human cybersecurity researchers, that is, discovering a bug in a software program and fixing it.

I will like to see how this stacks against China’s Quantum net, QC platform, AI, and hackers in the future. Not sold at this point until we truly have a QC infrastructure in place.


At DARPA’s Cyber Grand Challenge, bots showed off their ability to help a world wallowing in vulnerable code.

LAS VEGAS, Nev. — Mayhem ruled the day when seven AIs clashed here last week — a bot named Mayhem that, along with its competitors, proved that machines can now quickly find many types of security vulnerabilities hiding in vast amounts of code.

Sponsored by the Defense Advanced Research Projects Agency, or DARPA, the first-of-its-kind contest sought to explore how artificial intelligence and automation might help find security and design flaws that bad actors use to penetrate computer networks and steal data.