Menu

Blog

Page 11350

Feb 17, 2016

What Happens When You Zoom in Too Much on Google Maps

Posted by in category: futurism

It’s like some kind of surrealistic, never ending nightmare! Eeek.


Sleeping too well lately? Looking for that “something something” to turn those boring restful nights into a horrorscape? Turns out, zooming in too far on Google Maps’ user-uploaded 3D Spheres produces some impressively fucked up images.

Digital artist Kyle F. Williams has been collecting some of the weirder glitchy images Google Maps turns up when you zoom in too close on some of its 3D spheres. Some look like that photo in Back to the Future where the kids slowly fade. Others look like Picasso took some bad ketamine and got Photoshop:

Read more

Feb 17, 2016

The Good News From Google: A Conversation With Ruth Porat | Foreign Affairs

Posted by in categories: business, innovation, internet

rtx23c5n

“Ruth Porat has taken an unusual path to the tech world. Before becoming the chief financial officer at Google in May 2015 (and then at Alphabet, Google’s new parent company, a few months later), she held the same post at Morgan Stanley, where among other roles she worked closely with the U.S. government to sort out the troubles at the insurance corporation AIG and the mortgage-financing agencies Fannie Mae and Freddie Mac during the 2008 financial crisis.”

Read more

Feb 16, 2016

Could a robot run for U.S. president in 2020?

Posted by in categories: governance, robotics/AI, supercomputing

A fun story:


Advances in artificial intelligence have raised the question of a supercomputer running for office.

Read more

Feb 16, 2016

EU managers need to up cyber security collaboration, study finds

Posted by in categories: business, cybercrime/malcode, security

The lack of collaboration on cyber security between the senior levels of business is leaving UK firms exposed to fines and reputational damage, a study has revealed.

One in 10 C-level respondents to a survey by Palo Alto Networks said they “kind of” understand what defines an online security risk, but admitted they “still have to use Google to help explain it”.

This finding suggests that the lack of consensus on where the responsibility for cyber security lies could stem from some lack of cyber security understanding at the leadership level.

Read more

Feb 16, 2016

Engineers, get to work

Posted by in categories: engineering, time travel

Read more

Feb 16, 2016

This 3D ‘Bioprinter’ Creates Ears, Muscles

Posted by in categories: 3D printing, biotech/medical

A team at Wake Forest University has used a combination of living cells and a special gel to print out living human body parts — including ears, muscles and jawbones.

It’s an advance on previous attempts, which either involved making a plastic scaffold and then trying to get cells to grow in and on it, or that printed out organ shapes that ended up being too floppy and dying.

Read more

Feb 16, 2016

How Drones Are Reshaping The World

Posted by in categories: business, drones

The real question waiting to be address is how do we manage the technology to keep people safe without restricting businesses and technology progress efforts to make people’s lives better.


We look at how drones are revolutionizing the skies, and how this technology has so quickly moved from science fiction to ubiquitous reality. Airs in place of Insight on Monday, Feb 15 at 9 a.m. and 7 p.m.

Read more

Feb 16, 2016

From surveillance to smuggling: Drones in the War on Drugs

Posted by in categories: biotech/medical, drones, robotics/AI, transportation

Here is a thought — we’re already seeing criminals using drones for smuggling and hackers are enjoying holding data for ransom; what is going to happen when we add self driving cars, robots, etc. to this ever growing Cyber risks? Will we see a day that we have to register our drones and other robots with a national register and do a background check on owners because these things can be used as weapons?


“In Latin America drones are being used as part of the War on Drugs as both regional governments and the US are using surveillance drones to monitor drug trafficking and find smuggling routes. However, as drones are increasingly being used by drug cartels themselves to transport drugs between countries, could Latin America find itself at the forefront of emerging drone countermeasures?”

Source: From surveillance to smuggling: Drones in the War on Drugs | Remote Control Project Blog.

Read more

Feb 16, 2016

Bedtime stories for robots could teach them to be human — By Sharon Gaudin | Computerworld

Posted by in categories: education, ethics, media & arts, robotics/AI

reading-99244_1280-100591780-primary.idge

“Researchers at the Georgia Institute of Technology say that while there may not be one specific manual, robots might benefit by reading stories and books about successful ways to act in society.”

Read more

Feb 16, 2016

Time Transfer in Networked Systems

Posted by in category: futurism

I learned something new today; the first fax machine was built in 1860; and using the Nodal Clock for more accurate timestamping of real-time media IP signals and future event handling.


When transmitting an image from a sender to a receiver some notion of synchronization is required. In the 1860s Giovanni Caselli invented the Pantelegraph (a fax) that used a pendulum clock to regulate the transmitter’s scanning stylus and the receiver’s writing stylus.

In our day, “black-burst sync” and “tri-level sync” were used to align video signals in a facility. Now with Ethernet/IP taking the reins, synchronization may be achieved with common nodal clocks. The essence is for a “slave node” to lock its clock to a “master node” clock. Common node clocks can be used to create sync as will be shown. The SMPTE ST 2059 family of standards and the IEEE-1588 V2 Precision Time Protocol (PTP) standard are the basis for facility clocking and signal synchronization using IP networks.

Continue reading “Time Transfer in Networked Systems” »