Archive for the ‘security’ category: Page 116
Oct 24, 2016
Meet the Fully Programmable Linux Computer That’s Smaller Than a Coin
Posted by Shane Hinshaw in categories: computing, media & arts, security
Microcomputers are great for learning about code and hardware. The VoCore2 Mini is the smallest ever, packing full Linux functionality and wireless connectivity into a coin-sized device. New Atlas Deals has it for just $42.99.
This impressive little computer is capable of running programs in C, Java, Ruby, JavaScript, and many other languages. This means you can code the VoCore2 to expand its functionality, turning it into a VPN gateway, airplay music station, and much more.
You can also augment the VoCore2 with hardware components for further tinkering fun. Add a USB webcam to turn it into a home security camera, attach a microphone to issue voice commands to Siri or Echo, and so on. Your projects are limited only by your imagination.
Oct 16, 2016
Saudi Commentator Praises Israel; Latest Sign of Warming Ties Between Jewish and Arab States
Posted by Karen Hurst in categories: economics, security, sustainability
Could technology build friendships for Israel across the Middle East?
Israel and Saudi Arabia should form a “collaborative alliance” to become the “twin pillars of regional stability” in the Middle East, a top Saudi lobbyist wrote in The Hill on Tuesday, in what is the latest sign of warming and increasingly-public ties between Arab countries and the Jewish state.
Salman al-Ansari, the founder and president of the Saudi American Public Relations Affairs Committee, asserted that Israel can assist Saudi Arabia in implementing its Vision 2030, the Kingdom’s blueprint to diversify its economy. Al-Ansari specifically mentioned Israel’s expertise in mining and water technology, which makes Israel “extraordinarily qualified to help Saudi Arabia with its ambitious desalination plans.”
Oct 6, 2016
The quantum clock is ticking on encryption – and your data is under threat
Posted by Karen Hurst in categories: computing, encryption, quantum physics, security
Quantum computers pose a major threat to the security of our data. So what can be done to keep it safe?
Oct 6, 2016
Panasonic uses human touch to transfer data
Posted by Shane Hinshaw in categories: business, information science, security
In an age when digital information can fly around the connected networks of the world in the blink of an eye, it may seem a little old timey to consider delivering messages by hand. But that’s precisely what Panasonic is doing at CEATEC this week. The company is demonstrating a prototype communication system where data is transmitted from one person to another through touch.
There’s very little information on the system available, but Panasonic says that the prototype uses electric field communication technology to move data from “thing-to-thing, human-to-human and human-to-thing.” Data transfer and authentication occurs when the objects or people touch, with digital information stored in a source tag instantaneously moving to a receiver module – kind of like NFC tap to connect technology, but with people in the equation as well as devices.
Continue reading “Panasonic uses human touch to transfer data” »
Oct 5, 2016
Now You Can Use Your Head (and the Rest of Your Body) to Securely Transfer Data
Posted by Karen Hurst in categories: computing, privacy, security
In Brief.
- Data can be sent at rates of 50 bps on laptop touchpads and 25 bps with fingerprint sensors using on-body transmission.
- New developments in biometrics are allowing for even greater privacy and security in our networked society.
As security threats are more sophisticated today than in the past, modern data centers are becoming increasingly vulnerable. Micro-segmentation is your answer to protect your data center against these sophisticated threats. Read this trend brief to see how it builds security into the DNA of the data center for a cost-effective, future-proof way to protect what matters.
Oct 2, 2016
Science, Technology, and the Future of Warfare
Posted by Karen Hurst in categories: 3D printing, biotech/medical, computing, economics, existential risks, governance, military, nanotechnology, policy, robotics/AI, science, security
Nice POV read.
We know that emerging innovations within cutting-edge science and technology (S&T) areas carry the potential to revolutionize governmental structures, economies, and life as we know it. Yet, others have argued that such technologies could yield doomsday scenarios and that military applications of such technologies have even greater potential than nuclear weapons to radically change the balance of power. These S&T areas include robotics and autonomous unmanned system; artificial intelligence; biotechnology, including synthetic and systems biology; the cognitive neurosciences; nanotechnology, including stealth meta-materials; additive manufacturing (aka 3D printing); and the intersection of each with information and computing technologies, i.e., cyber-everything. These concepts and the underlying strategic importance were articulated at the multi-national level in NATO’s May 2010 New Strategic Concept paper: “Less predictable is the possibility that research breakthroughs will transform the technological battlefield … The most destructive periods of history tend to be those when the means of aggression have gained the upper hand in the art of waging war.”
As new and unpredicted technologies are emerging at a seemingly unprecedented pace globally, communication of those new discoveries is occurring faster than ever, meaning that the unique ownership of a new technology is no longer a sufficient position, if not impossible. They’re becoming cheaper and more readily available. In today’s world, recognition of the potential applications of a technology and a sense of purpose in exploiting it are far more important than simply having access to it.
Continue reading “Science, Technology, and the Future of Warfare” »
Oct 1, 2016
Robot customs officers debut in China ports
Posted by Karen Hurst in categories: robotics/AI, security
Robotic Custom Guards — could this be the answer to all countries problems for border security and police as part of fairness?
NK Technology, Beijing, Oct 2 : Ten robots have started working as customs officers at three ports in China’s Guangdong province, authorities said on Sunday.
They were the first batch of intelligent robots, to be used by Chinese customs at the ports of Gongbei, Hengqin and Zhongshan, Xinhua news agency reported.
The robots, named Xiao Hai, have state-of-the-art perception technology and are able to listen, speak, learn, see and walk.
Sep 29, 2016
Will quantum teleportation defeat quantum decryption?
Posted by Karen Hurst in categories: computing, encryption, finance, quantum physics, security
Nice article; however, not sure if the author is aware Los Alamos already has a quantum net as well as some Europe banks have the capabilities and 4 months ago it was announced that a joint effort by various countries from Europe, Asia, etc. have come together to re-engineer the Net infrastructure with QC technology…
Maybe the quantum will giveth what the quantum taketh away… at least when it comes to secure transmissions.
There’s been much speculation that emerging quantum computers will become capable of breaking advanced public key cryptography systems, such as 2048-bit RSA. This might leave encrypted data transmissions exposed to anyone who happens to own such a quantum computer.
Continue reading “Will quantum teleportation defeat quantum decryption?” »