Menu

Blog

Page 5759

Mar 8, 2021

China Plans to Defeat US Supremacy in AI, Quantum Computing With Five-Year Plan

Posted by in categories: government, quantum physics, robotics/AI

Another call for the US government to declare a National Initiative for the USA to reach AGI by 2025.

“China Plans to Defeat US Supremacy in AI, Quantum Computing With Five-Year Plan”


Huawei and ZTE would lead the country in battling tech with tech!

Continue reading “China Plans to Defeat US Supremacy in AI, Quantum Computing With Five-Year Plan” »

Mar 8, 2021

SN4KE: A lightweight and scalable framework for binary mutation testing

Posted by in category: cybercrime/malcode

When developers deliver software to their clients, they often also provide what is known as a ‘test suite.’ A test suite is a tool that allows users to test software, unveil any bugs it might have and give developers a chance to fix these bugs or other potential issues.

In addition to evaluating , therefore, developers also need to ascertain the efficacy of a suite in identifying bugs and errors. One way to run test suite evaluations is via , a technique that generates several ‘mutants’ of a program by slightly modifying its original code. While mutation testing tools have proved to be incredibly helpful, most of them cannot be applied to software that is only available in binary code (a way of representing texts or instructions for computers using two symbols, generally ‘0’ and ‘1’).

Researchers at Arizona State University, Worcester Polytechnic Institute and the University of Minnesota have recently developed SN4KE, a framework that can be used to carry out mutation analyses at a binary level. This framework, presented at the Binary Analysis Research (BAR) NDSS symposium ‘21 in February, is a new tool to efficiently test suites for software based on binary codes.

Mar 8, 2021

A new type of supply-chain attack with serious consequences is flourishing

Posted by in categories: cybercrime/malcode, robotics/AI, transportation

A new type of supply chain attack unveiled last month is targeting more and more companies, with new rounds this week taking aim at Microsoft, Amazon, Slack, Lyft, Zillow, and an unknown number of others. In weeks past, Apple, Microsoft, Tesla, and 32 other companies were targeted by a similar attack that allowed a security researcher to execute unauthorized code inside their networks.

The latest attack against Microsoft was also carried out as a proof-of-concept by a researcher. Attacks targeting Amazon, Slack, Lyft, and Zillow, by contrast, were malicious, but it’s not clear if they succeeded in executing the malware inside their networks. The npm and PyPi open source code repositories, meanwhile, have been flooded with more than 5000 proof-of-concept packages, according to Sonatype, a firm that helps customers secure the applications they develop.

“Given the daily volume of suspicious npm packages being picked up by Sonatype’s automated malware detection systems, we only expect this trend to increase, with adversaries abusing dependency confusion to conduct even more sinister activities,” Sonatype researcher Ax Sharma wrote earlier this week.

Mar 8, 2021

Headphones without headphones: We test Lucyd Lyte Bluetooth sunglasses

Posted by in category: futurism

Bluetooth sunglasses are a great idea—but these aren’t quite good enough.

Mar 8, 2021

Autonomous Materials: Researchers Design Patterns in Self-Propelling Liquid Crystals

Posted by in categories: bioengineering, biotech/medical, robotics/AI

Materials capable of performing complex functions in response to changes in the environment could form the basis for exciting new technologies. Think of a capsule implanted in your body that automatically releases antibodies in response to a virus, a surface that releases an antibacterial agent when exposed to dangerous bacteria, a material that adapts its shape when it needs to sustain a particular weight, or clothing that senses and captures toxic contaminants from the air.

Scientists and engineers have already taken the first step toward these types of autonomous materials by developing “active” materials that have the ability to move on their own. Now, researchers at the University of Chicago have taken the next step by showing that the movement in one such active material—liquid crystals—can be harnessed and directed.

This proof-of-concept research, published on February 182021, in the journal Nature Materials, is the result of three years of collaborative work by the groups of Juan de Pablo, Liew Family Professor of Molecular Engineering, and Margaret Gardel, Horace B. Horton Professor of Physics and Molecular Engineering, along with Vincenzo Vitelli, professor of physics, and Aaron Dinner, professor of chemistry.

Mar 8, 2021

Bacteria Reprogrammed to Make Designer Molecule Used in Pharmaceutical Drugs

Posted by in categories: biotech/medical, chemistry, engineering, genetics

Envisioning an animal-free drug supply, scientists have — for the first time — reprogrammed a common bacterium to make a designer polysaccharide molecule used in pharmaceuticals and nutraceuticals. Published on March 22021, in Nature Communications, the researchers modified E. coli to produce chondroitin sulfate, a drug best known as a dietary supplement to treat arthritis that is currently sourced from cow trachea.

Genetically engineered E. coli is used to make a long list of medicinal proteins, but it took years to coax the bacteria into producing even the simplest in this class of linked sugar molecules — called sulfated glycosaminoglycans — that are often used as drugs and nutraceuticals…

“It’s a challenge to engineer E. coli to produce these molecules, and we had to make many changes and balance those changes so that the bacteria will grow well,” said Mattheos Koffas, lead researcher and a professor of chemical and biological engineering at Rensselaer Polytechnic Institute. “But this work shows that it is possible to produce these polysaccharides using E. coli in animal-free fashion, and the procedure can be extended to produce other sulfated glycosaminoglycans.”

Mar 8, 2021

Astronomers Have Discovered the Most Distant Source of Radio Emission Ever Known – 13 Billion Light-Years Away

Posted by in category: cosmology

With the help of the European Southern Observatory’s Very Large Telescope (ESO ’s VLT), astronomers have discovered and studied in detail the most distant source of radio emission known to date. The source is a “radio-loud” quasar — a bright object with powerful jets emitting at radio wavelengths — that is so far away its light has taken 13 billion years to reach us. The discovery could provide important clues to help astronomers understand the early Universe.

Quasars are very bright objects that lie at the center of some galaxies and are powered by supermassive black holes. As the black hole consumes the surrounding gas, energy is released, allowing astronomers to spot them even when they are very far away.

Continue reading “Astronomers Have Discovered the Most Distant Source of Radio Emission Ever Known – 13 Billion Light-Years Away” »

Mar 8, 2021

Twistoptics: A New, Efficient Way to Control Optical Nonlinearity

Posted by in categories: biotech/medical, chemistry, cybercrime/malcode, engineering, quantum physics, solar power

Columbia researchers engineer first technique to exploit the tunable symmetry of 2D materials for nonlinear optical applications, including laser, optical spectroscopy, imaging, and metrology systems, as well as next-generation optical quantum information processing and computing.

Nonlinear optics, a study of how light interacts with matter, is critical to many photonic applications, from the green laser pointers we’re all familiar with to intense broadband (white) light sources for quantum photonics that enable optical quantum computing, super-resolution imaging, optical sensing and ranging, and more. Through nonlinear optics, researchers are discovering new ways to use light, from getting a closer look at ultrafast processes in physics, biology, and chemistry to enhancing communication and navigation, solar energy harvesting, medical testing, and cybersecurity.

Columbia Engineering researchers report that they developed a new, efficient way to modulate and enhance an important type of nonlinear optical process: optical second harmonic generation — where two input photons are combined in the material to produce one photon with twice the energy — from hexagonal boron nitride through micromechanical rotation and multilayer stacking. The study was published online on March 32021, by Science Advances.

Mar 8, 2021

Behavior needs neural variability

Posted by in category: neuroscience

Human and non-human animal behavior is highly malleable and adapts successfully to internal and external demands. Such behavioral success stands in striking contrast to the apparent instability in neural activity (i.e., variability) from which it arises. Here, we summon the considerable evidence across scales, species, and imaging modalities that neural variability represents a key, undervalued dimension for understanding brain-behavior relationships at inter-and intra-individual levels. We believe that only by incorporating a specific focus on variability will the neural foundation of behavior be comprehensively understood.

Mar 8, 2021

Unsecured cloud configurations expose data across thousands of mobile apps

Posted by in category: security

In mobile application development, server-side storage of the application’s data remains top priority. In particular, many developers have begun using backend APIs that enable their apps to query a server for information in real time rather than reply upon static data stored in files. However, as many cloud storage services have been found to use unsecured configurations, data on thousands of mobile applications could be at risk.

A main challenge arises when the task of securing the configurations of these services falls upon the app developers rather than the provider, such as Amazon AWS, Google’s Firebase Storage or Azure by Microsoft. When developers use these services for the very purpose of having their API security taken care of, they invest the majority of their efforts into building the apps rather than protecting stored information. Such an oversight could threaten many app developers as well as their employers and users.

In 2021, the mobile security company Zimperium found that over 14 percent of using cloud storage face risks due to unsecured configurations. This research has revealed that, globally and across all industries, various apps are vulnerable to the exposure of publicly identifiable information (PII), fraud and unregulated internal IP/configuration sharing.