Menu

Blog

Archive for the ‘security’ category: Page 123

Jan 14, 2016

Ex-NSA Boss Says FBI is wrong on Encryption

Posted by in categories: computing, encryption, government, privacy, security, software

Ex-NSA boss says FBI director is wrong on encryption

Continue reading “Ex-NSA Boss Says FBI is wrong on Encryption” »

Jan 11, 2016

Insertables: I’ve got IT under my skin

Posted by in categories: electronics, security, wearables

Insertables are here! They are a new class of devices that go literally under your skin! Heffernan, Vetere, and Chang from the University of Melbourne discuss what they are, what they could be used for, their risks and the challenges for the HCI community. Fascinating! @kaylajheffernan # insertables #hci # wearables

Read more

Jan 9, 2016

Science Documentary: DNA Hard Drives, Quantum Computing, Moore’s Law

Posted by in categories: computing, education, materials, nanotechnology, particle physics, quantum physics, science, security

DNA is similar to a hard drive or storage device, in that contains the memory of each cell of every living, and has the instructions on how to make that cell. DNA is four molecules combined in any order to make a chain of one larger molecule. And if you can read that chain of four molecules, then you have a sequence of characters, like a digital code. Over the years the price of sequencing a human genome has dropped significantly, much to the delight of scientists. And since DNA is a sequence of four letters, and if we can manipulate DNA, we could insert a message and use DNA as the storage device.

At this point in time, we are at the height of the information age. And computers have had an enormous impact on all of our lives. Any information is able to be represented as a collection of bits. And with Moore’s law, which states that computing power doubles every 18 months, our ability to manipulate and store these bits has continued to grow and grow. Moore’s law has been driven by scientists being able to make transistors and integrated circuits continuously smaller and smaller, but there eventually comes a point we reach in which these transistors and integrated circuits cannot be made any smaller than they already are, since some are already at the size of a single atom. This inevitably leads us into the quantum world. Quantum mechanics has rules which are, in many ways, hard for us to truly comprehend, yet are nevertheless tested. Quantum computing looks to make use of these strange rules of quantum physics, and process information in a totally different way. Quantum computing looks to replace the classical bits which are either a 0 or a 1, with quantum bits, or qubits, which can be both a 0 and a 1 at the same time. This ability to be two different things at the same time is referred to as a superposition. 200 qubits hold more bits of information than there are particles in the universe. A useful quantum computer will require thousands or even millions of physical qubits. Anything such as an atom can serve as a quantum bit for making a quantum computer, then you can use a superconducting circuit to build two artificial atoms. So at this point in time we have a few working quantum transistors, but scientists are working on developing the quantum integrated circuit. Quantum error correction is the biggest problem encountered in development of the quantum computer. Quantum computer science is a field that right now is in its very early stages, since scientists have yet been able to develop any quantum hardware.

Continue reading “Science Documentary: DNA Hard Drives, Quantum Computing, Moore’s Law” »

Jan 8, 2016

Crime-Fighting Robots Go On Patrol In Silicon Valley

Posted by in categories: entertainment, robotics/AI, security

A new kind of security guard is on patrol in Silicon Valley: Crime-fighting robots that look like they’re straight out of a sci-fi movie. News, Sports, Weather, Traffic and the Best of SF

Read more

Dec 31, 2015

John McAfee says his new security product is a ‘f—ing game changer’

Posted by in categories: encryption, geopolitics, military, security

It’s an interesting idea, if not an original one. (it’s not) The problem is that, military grade encryption or not, it would be a single point of failure that could compromise your on AND offline security in one fell swoop.


Fugitive presidential candidate John McAfee is going back to his roots with a new security product that he calls “a f—ing game changer.”

Read more

Dec 16, 2015

Russia, China Building ‘Robot’ Army

Posted by in categories: business, ethics, military, robotics/AI, security

Despite more than a thousand artificial-intelligence researchers signing an open letter this summer in an effort to ban autonomous weapons, Business Insider reports that China and Russia are in the process of creating self-sufficient killer robots, and in turn is putting pressure on the Pentagon to keep up.

“We know that China is already investing heavily in robotics and autonomy and the Russian Chief of General Staff [Valery Vasilevich] Gerasimov recently said that the Russian military is preparing to fight on a roboticized battlefield,” U.S. Deputy Secretary of Defense Robert Work said during a national security forum on Monday.

Work added, “[Gerasimov] said, and I quote, ‘In the near future, it is possible that a complete roboticized unit will be created capable of independently conducting military operations.’”

Read more

Dec 12, 2015

Technology Will Save Our Future, According To Japanese SF Author Taiyo Fujii

Posted by in categories: augmented reality, engineering, genetics, security

I’ve been increasingly interested in translated science fiction novels, and one of the best ones that I picked up this year was Taiyo Fujii’s debut Gene Mapper.

Gene Mapper takes place in a future where augmented reality and genetic engineering is commonplace. When a freelance gene mapper named Hayashida finds that a project that he had worked on is collapsing, he believes that it’s being sabotaged. Determined to fix it, he travels to Vietnam where he finds that there’s more behind the problem than he initially thought.

You can read a tie-in story over on Lightspeed Magazine, ‘Violation of the TrueNet Security Act’.

Read more

Nov 27, 2015

Airbus Patents Way to Board Planes That’s Straight out of Sci-Fi

Posted by in categories: security, transportation

If the Airbus patent ever becomes reality, this boarding style would be a thing of the past. (Photo: Thinkstock)

Unless you’re deathly afraid of planes, one of the worst things about flying is the sheer tedium of it. It’s nothing but indeterminate waiting — waiting for security, waiting to board, waiting to reach your destination.

Airbus has just been granted a patent for a wild new way to try to speed up boarding on planes — and as Ars Technica points out, it’s just like something out of the classic kids TV show Thunderbirds.

Read more

Nov 25, 2015

Inkjet hologram printing now possible

Posted by in categories: chemistry, materials, security

Vivid holographic images and text can now be produced by means of an ordinary inkjet printer. This new method, developed by a team of scientists from ITMO University in Saint Petersburg, is expected to significantly reduce the cost and time needed to create the so-called rainbow holograms, commonly used for security purposes — to protect valuable items, such as credit cards and paper currency, from piracy and falsification. The results of the study were published 17 November in the scientific journal Advanced Functional Materials.

The team, led by Alexander Vinogradov, senior research associate at the International Laboratory of Solution Chemistry of Advanced Materials and Technologies (SCAMT) in ITMO University, developed colorless ink made of nanocrystalline titania, which can be loaded into an inkjet printer and then deposited on special microembossed paper, resulting in unique patterned images. The ink makes it possible to print custom holographic images on transparent film in a matter of minutes, instead of days as with the use of conventional methods.

Rainbow holograms are widely used to fight against the forgery of credit cards, money, documents and certain manufactured products that call for a high level of protection. Even though the technology of obtaining holographic images was already developed in the 1960s, there still exist numerous technical difficulties that impede its further spread and integration into polygraphic industry.

Read more

Nov 23, 2015

BITNATION @ The Keiser Report

Posted by in categories: governance, security

BITNATION : Governance 2.0

Bitnation provides the same services traditional governments provides, from dispute resolution and insurance to security and much more.

Continue reading “BITNATION @ The Keiser Report” »