Toggle light / dark theme

A research team in the US has created a software that can quickly identify the information in cancer reports that would not only save time and work-hours but also reveal overlooked avenues in cancer research.

Don’t Miss: Hatchimals in Stock at Walmart

Much of the cancer-related data is drawn from electronic, text-based clinical reports that must be manually curated — a time-intensive process — before it can be used in research.

Read more

This research has been going on for a very long time.


Researchers at the National Institute of Informatics are closing in on a solution to keep computers cool by submerging them under water. How will such research benefit the computer industry? What are the implications of such technology?

Underwater computers sound idea but, when you look at the amount of power dissipated by computers, the idea becomes less bizarre.

Currently, multiple forms of cooling exist for computers, including methods that use air, water, mineral oil, and even liquid helium for some of the highest overclocked processors. If so many forms of cooling exist and are in wide use, why bother with underwater cooling? Researchers at the National Institute of Informatics have been doing just this and there is a very good reason for such cooling methods.

No autonomous cars, planes, ships, weapons (not sure I would even still want these), and other robots for me until we have our Net and other infrastructure replaced with QC.


It seems that all of Silicon Valley is designing artificial intelligence for driverless cars. But before we hand over our driving to computers, Charlie Miller, a well-known computer security researcher, would like car companies to pay attention to security.

Miller, who is a security engineer at Uber’s advanced technology center, spent a few years looking into the security of automobiles. And what he found didn’t impress him. He and his friend Chris Valasek hacked a Jeep remotely in 2014, and, after a series of denials from the car company, Chrysler had to announce a recall of 1.4 million vehicles. Miller gave a scary and hilarious talk at the recent ARM TechCon event in Santa Clara, Calif.

Wonder how Tim Cook, Satya & Bill, and Eric and Sergey will respond.


Overseas critics of the law argue it threatens to shut foreign technology companies out of various sectors. PHOTO: REUTERS

BEIJING: China adopted a controversial cybersecurity law on Monday to counter what Beijing says are growing threats such as hacking and terrorism, although the law has triggered concern from foreign business and rights groups.

The legislation, passed by China’s largely rubber-stamp parliament and set to come into effect in June 2017, is an “objective need” of China as a major internet power, a parliament official said.

Read more

Where is Waste Management (WM) when you need them. Looks like a golden opportunity for those in the trash and recycle industry.


BEIJING — China’s Singles Day, the world’s biggest shopping extravaganza that fell on Nov 11, saw bargain hunters spend 10 billion yuan (S$2.07 billion) in just seven minutes on the country’s largest online-shopping site, Alibaba’s Tmall, last Friday after midnight.

But the spending orgy could choke landfills and take a huge toll on the environment, employees of waste-disposal and recycling firms say.

China’s version of the United States’ Black Friday will result in one billion parcels travelling from retailers to customers’ doorsteps over the course of the next few weeks, according to the China Express Association (CEA).

Luv the map; however, missing a lot of info. Namely, many decades and contributors. QC officially recorded to start in 1960 with Stephen Wiesner discovery of a cryptographic tool. And, even modern day QC such as a QC Net has been in existence since late 90s with Los Alamos.

Still nice colored map for a limited view of 2014, 2015, and current. However, I don’t see the ORNL, Oxford, U. of Sydney, China, USC, MIT, etc. breakthroughs most importantly the scalable Quantum, syn. diamonds contribution to enable stable QC and QC Net.


From law enforcement to criminals, governments to insurgents, and activists to Facebook dabblers, many people have come to rely on encryption to protect their digital information and keep their communications secure. But the current forms of encryption could be obsolete the moment anyone succeeds in building a quantum computer. A what! Read on about the brave new world awaiting us.

Quantum Computers and the End of Privacy