Menu

Blog

Page 11478

Feb 29, 2016

Giant Viruses Feature Their Own Built-In Antivirus Software

Posted by in categories: biotech/medical, computing, particle physics

Computer illustration of the mimivirus particle. Credit Jose Antonio Penas. Mimiviruses are viruses so big they can actually be seen with the naked eye. European.

Read more

Feb 29, 2016

Sharing secrets with light

Posted by in categories: finance, quantum physics

More great news on Quantum Networks; some banks in Europe are leveraging the technology to communicate among themselves.


Light is everywhere. Even the darkest of rooms in our homes contain a handful of blinking LEDs. But what is light? Few of us ever stop to think about this question. Around a hundred years ago scientists discovered that light comes in granules, much like the sand on a beach, which we now call photons.

These are truly bizarre objects that obey the rules of the quantum world. The rules allow some pairs of photons to share a property called entanglement. After being entangled, two photons behave as one object. Changing one photon will affect the other at exactly the same time, no matter how far apart they are.

Continue reading “Sharing secrets with light” »

Feb 29, 2016

Quarks To Quasars Photo

Posted by in categories: particle physics, space travel

Read more

Feb 29, 2016

Kaspersky Labs rolls out targeted threat detection platform for enterprises

Posted by in category: cybercrime/malcode

“Kaspersky admits that targeted attacks represent less than one percent of the entire threat landscape”;

Hmmm (wonder how much it cost to develop and deploy?) At least it’s a start.

https://lnkd.in/bzjHfzF

Continue reading “Kaspersky Labs rolls out targeted threat detection platform for enterprises” »

Feb 29, 2016

What is the Dark Web?

Posted by in category: cybercrime/malcode

This has been around for a really, really long time. I remember many years ago one could go online without too much hassel and locate software code that the hacking network shared to teach folks their trade. I actually tested some of it for a firm to help test their infrastructure security; and it worked really well. However, now days it’s about the trade of id’s, credit card information, etc.


Beyond the regular Web, there is the Dark Web. You’ve probably heard something about it but probably just enough to know you didn’t want to know too much more about it. Well, here are some answers to some common questions about the Dark Web.

Read more

Feb 29, 2016

Google opens applications for free DDoS blocker to prevent hackers taking out the Web

Posted by in categories: cybercrime/malcode, internet

The DDoS prevention tool is part of Google Ideas, renamed Jigsaw, whose stated mission is to “build products to help people investigate corruption.”

Read more

Feb 29, 2016

Graphene Patterned After Moth Eyes Could Give Us ‘Smart Wallpaper’

Posted by in category: materials

Tweaking the structure of graphene so that it matches patterns found in the eyes of moths could one day give us “smart wallpaper,” among a host of other useful technologies.

Using a novel technique called “nano texturing,” scientists at the University of Surrey in England have successfully modified ultra-thin graphene sheets to create the most efficient light-absorbent material to date, which is capable of generating electricity from both captured light and waste heat. They described their work in a new paper in Science Advances.

Continue reading “Graphene Patterned After Moth Eyes Could Give Us ‘Smart Wallpaper’” »

Feb 29, 2016

Want to avoid breaches Think like a hacker

Posted by in category: cybercrime/malcode

One philosophy that I have often practice and encourage my team to do is to think like a hacker. It has served me and my teams well. At times; I have shared areas where risks exist in the emerging technologies; and hope that I don’t make folks too nervous. However, we all have to start thinking like hackers or pay the cost some day.


C-level executives from giant corporations and officials from the smallest companies all must think like hackers and test their cyber defenses regularly if they expect to avoid breaches of their systems.

That’s according to a panel of cybersecurity experts who recently spoke to a crowd gathered at the Donald Danforth Plant Science Center.

Continue reading “Want to avoid breaches Think like a hacker” »

Feb 29, 2016

Imaging algorithm gathers information about how cells move

Posted by in categories: biotech/medical, information science

Brown University engineers have developed a new technique to help researchers understand how cells move through complex tissues in the body. They hope the tool will be useful in understanding all kinds of cell movements, from how cancer cells migrate to how immune cells make their way to infection sites.

The technique is described in a paper published in the Proceedings of the National Academy of Sciences.

The traditional method for studying cell movement is called traction force microscopy (TFM). Scientists take images of cells as they move along 2-D surfaces or through 3-D gels that are designed as stand-ins for actual body tissue. By measuring the extent to which cells displace the 2-D surface or the 3-D gel as they move, researchers can calculate the forces generated by the cell. The problem is that in order to do the calculations, the stiffness and other mechanical properties of artificial tissue environment must be known.

Read more

Feb 29, 2016

Leap Motion

Posted by in category: virtual reality

This hand tracking software helps you to touch the future. #virtualreality

Read more