Menu

Blog

Page 3829

Jun 20, 2022

More Versatile Quantum Sensors

Posted by in categories: nuclear energy, quantum physics

Quantum sensors can now detect signals of arbitrary frequencies thanks to a quantum version of frequency mixing—a widely used technique in electronics.


Monitoring the fissile material aboard nuclear-powered submarines is notoriously difficult. Researchers may now have a way to safeguard this weapons-grade substance.

Jun 20, 2022

Tracking Nuclear Material Aboard Submarines

Posted by in categories: military, nuclear energy, particle physics

Monitoring the fissile material aboard nuclear-powered submarines is notoriously difficult. Researchers may now have a way to safeguard this weapons-grade substance.

Last year, the United Kingdom and the United States agreed to transfer some of their nuclear-powered submarines to Australia, a country that, at that time, possessed none. On hearing the announcement, Bernadette Cogswell and Patrick Huber of Virginia Tech in Blacksburg say that they were immediately concerned as there is currently no easy way to safeguard a nuclear reactor aboard a submarine. Now, the duo has come up with a technique that could solve that problem [1]. They say that the method could be used to confirm the presence of a submarine’s nuclear core without the need for onboard monitoring.

Most naval nuclear reactors employ uranium that is highly enriched fissile uranium-235 (235U 2 3 5 U 235U), a material also used to make nuclear weapons. For land-based reactors, inspectors keep track of 235U 2 3 5 U 235U using neutrino detectors placed close to an operating core (see Feature: Neutrino Detectors for National Security). But this technique doesn’t work for the water-submerged cores in submarines at sea. It also fails for the weak signals from powered-down cores, allowing operators to subvert checks of docked submarines.

Jun 20, 2022

A Synthetic Lattice in a Cold Atomic Cloud

Posted by in categories: cybercrime/malcode, particle physics

Defining a fermionic lattice using spin and momentum instead of spatial coordinates opens the door for interacting-fermion simulations with more complex lattice geometries.


Amazon Linux server can be hacked easily. Critical Privilege Escalation vulnerability in Log4j Hotpatch released to fix Log4j vulnerabilities — Vulnerabilities — Information Security Newspaper | Hacking News.

Jun 20, 2022

Amazon Linux server can be hacked easily. Critical Privilege Escalation vulnerability in Log4j Hotpatch released to fix Log4j vulnerabilities

Posted by in category: cybercrime/malcode

Vulnerabilities — information security newspaper | hacking news.

Jun 20, 2022

Critical vulnerability in the way Sony PS3, PS4, and PS5 consoles read Blu-Ray discs allows rooting and modifying the firmware

Posted by in category: futurism

Jun 20, 2022

BRATA Android Malware Gains Advanced Mobile Threat Capabilities

Posted by in categories: cybercrime/malcode, finance, robotics/AI

Cybercriminals behind BRATA have added more APT capabilities to the Android mobile malware to make their attacks on financial apps even more stealthy.

Jun 20, 2022

Google LIMoE — A Step Towards Goal Of A Single AI

Posted by in categories: information science, robotics/AI

Google announced a new technology called LIMoE that it says represents a step toward reaching Google’s goal of an AI architecture called Pathways.

Pathways is an AI architecture that is a single model that can learn to do multiple tasks that are currently accomplished by employing multiple algorithms.

LIMoE is an acronym that stands for Learning Multiple Modalities with One Sparse Mixture-of-Experts Model. It’s a model that processes vision and text together.

Jun 20, 2022

Artificial Sun: China Claims Designing World’s 1st Power Plant That Can Convert Nuclear Fusion Energy Into Electricity

Posted by in categories: engineering, military, nuclear energy

The world’s leading powers are investing in nuclear fusion and working to resolve the engineering challenges associated with it. If successful, nuclear fusion can provide nearly limitless energy with minimal waste. Chinese ‘Military’ Base Near USA – After Australia, China Looks To Develop Solomon Islands-Like Facility Near Hawaii – Reports China’s new announcements indicate that […].

Jun 20, 2022

Microsoft Lasers Music into Glass for 1000 Years of Storage

Posted by in categories: food, information science, media & arts, nanotechnology, robotics/AI, security

Philip Glass to release a short silence on the matter.


The music vault is a parallel project to the Global Seed Vault (opens in new tab), which keeps the seeds of today’s trees and plants safe for the future, just in case we need to rebuild agriculture for any reason. The vault is located on the island of Spitsbergen, Norwegian territory, within the Arctic circle. It lacks tectonic activity, is permanently frozen, is high enough above sea level to stay dry even if the polar caps melt, and even if the worst happens, it won’t thaw out fully for 200 years. Just to be on the safe side, the main vault is built 120m into a sandstone mountain, and its security systems are said to be robust. As of June 2021, the seed vault had conserved 1,081,026 different crop samples.

The music is to be stored in a dedicated vault in the same mountain used by the seed vault. The glass used is an inert material, shaped into platters 75mm (3 inches) across and 2mm (less than 1/8th of an inch) thick. A laser encodes data in the glass by creating layers of three-dimensional nanoscale gratings and deformations. Machine learning algorithms read the data back by decoding images and patterns created as polarized light shines through the glass. The silica glass platters are fully resistant to electromagnetic pulses and the most challenging of environmental conditions. It can be baked, boiled, scoured and flooded without degradation of the data written into the glass. Tests to see if it really does last many thousands of years, however, can be assumed to be ongoing.

Continue reading “Microsoft Lasers Music into Glass for 1000 Years of Storage” »

Jun 20, 2022

More cyber warfare with Russia lies on the horizon

Posted by in categories: cybercrime/malcode, military