Menu

Blog

Page 8559

Jun 11, 2019

All fields of the standard model and gravity are unified as an E8 principal bundle connection

Posted by in category: particle physics

A non-compact real form of the E8 Lie algebra has G2 and F4 subalgebras which break down to strong su, electroweak su x u, gravitational so(3,1), the frame-Higgs, and three generations of fermions related by triality. The interactions and dynamics of these 1-form and Grassmann valued parts of an E8 superconnection are described by the curvature and action over a four dimensional base manifold.

https://www.researchgate.net/…/2217412_An_Exceptionally_Sim…

👽 🗯

Continue reading “All fields of the standard model and gravity are unified as an E8 principal bundle connection” »

Jun 11, 2019

Scientists Reverse The Age of White Blood Cells In A Female Human Being – They’re Now 20 Years Younger

Posted by in categories: biotech/medical, life extension, neuroscience

Elizabeth Parris, the CEO of Bioviva USA Inc, has become the very first human being to successfully, from a biological standpoint, reverse the age of her white blood cells, thanks to her own company’s experimental therapies. Bioviva utilizes intramural and extramural peer-reviewed research to create therapies for age-related diseases (Parkinson’s, Alzheimer’s, cancer, heart-disease), and now, they have reversed 20 years of ‘telomere shortening’ in a human for the first time.

Telomeres are short segments of DNA that cap the ends of every chromosome and act as a protective feature against wear and tear, which occurs naturally as the human body ages. As we age, these telomeres become shorter and shorter as our cells continue to divide more and more. Eventually they become too short to protect the chromosome, which is what causes our cells to malfunction and age related diseases to start setting in.

In September of last year, the 44 year old volunteered to partake in two of her own company’s experimental gene therapies; one intended to battle stem cell depletion, which happens when we age and leads to various age related diseases, and the other intended to protect against loss of muscle mass with age.

Continue reading “Scientists Reverse The Age of White Blood Cells In A Female Human Being – They’re Now 20 Years Younger” »

Jun 11, 2019

Engineers design nanostructured diamond metalens for compact quantum technologies

Posted by in categories: computing, nanotechnology, particle physics, quantum physics

At the chemical level, diamonds are no more than carbon atoms aligned in a precise, three-dimensional (3D) crystal lattice. However, even a seemingly flawless diamond contains defects: spots in that lattice where a carbon atom is missing or has been replaced by something else. Some of these defects are highly desirable; they trap individual electrons that can absorb or emit light, causing the various colors found in diamond gemstones and, more importantly, creating a platform for diverse quantum technologies for advanced computing, secure communication and precision sensing.

Quantum technologies are based on units of quantum information known as “qubits.” The spin of electrons are prime candidates to serve as qubits; unlike binary computing systems where data takes the form of only 0s or 1s, electron spin can represent information as 0, 1, or both simultaneously in a quantum superposition. Qubits from are of particular interest to quantum scientists because their quantum-mechanical properties, including superposition, exist at room temperature, unlike many other potential quantum resources.

The practical challenge of collecting information from a single atom deep inside a crystal is a daunting one, however. Penn Engineers addressed this problem in a recent study in which they devised a way to pattern the surface of a diamond that makes it easier to collect light from the defects inside. Called a metalens, this contains nanoscale features that bend and focus the light emitted by the defects, despite being effectively flat.

Continue reading “Engineers design nanostructured diamond metalens for compact quantum technologies” »

Jun 11, 2019

Used SpaceX Rocket Launching 3 Satellites Wednesday: How to Watch Live

Posted by in category: satellites

The RCM mission will lift off at 10:17 a.m. EDT from California’s Vandenberg Air Force Base.

Read more

Jun 11, 2019

When Will Quantum Computers Outperform Regular Computers?

Posted by in categories: computing, particle physics, quantum physics

Any day now, quantum computers will solve a problem too hard for a classical computer to take on. Or at least, that’s what we’ve been hoping. Scientists and companies are racing toward this computing milestone, dubbed quantum supremacy and seemingly just beyond our reach, and if you’ve been following the quantum computing story, you might wonder why we’re not there yet, given all the hype.

The short answer is that controlling the quantum properties of particles is hard. And even if we could use them to compute, “quantum supremacy” is a misleading term. The first quantum supremacy demonstration will almost certainly be a contrived problem that won’t have a practical or consumer use. Nonetheless, it’s a crucial milestone when it comes to benchmarking these devices and establishing what they can actually do. So what’s holding us back from the future?

Read more

Jun 11, 2019

Russian Biologist Pledges to Create More CRISPR-Edited Babies

Posted by in category: biotech/medical

“I think I’m crazy enough to do it,” he told Nature.

Rebrikov plans to target CCR5, the same gene as He, which could theoretically make the babies immune to HIV. But experts say the risks and unknowns — including the possibility of premature death — vastly outweigh any potential benefits.

“The technology is not ready,” CRISPR-Cas9 co-inventor Jennifer Doudna told Nature of Rebrikov’s plans. “It is not surprising, but it is very disappointing and unsettling.”

Continue reading “Russian Biologist Pledges to Create More CRISPR-Edited Babies” »

Jun 11, 2019

Beewolves use a gas to preserve food

Posted by in category: food

Scientists from the Universities of Regensburg and Mainz and the Max Planck Institute for Chemical Ecology discovered that the eggs of the European beewolf produce nitric oxide. The gas prevents the larvae’s food from getting moldy in the warm and humid brood cells. The results were published in the journal eLife.

Food stored in warm and humid conditions gets moldy very quickly and thus becomes inedible or even toxic. To prevent this, we use refrigerators and freezers as well as various other methods of preservation. Animals do not have such technical appliances and therefore need to find other ways to preserve food. The European beewolf Philanthus triangulum, a solitary wasp species whose females hunt honey bees, has evolved a successful method of food preservation. A female takes up to five honey bees into its brood cells where they serve as food for a young beewolf. Female beewolves prefer to build their nests in sunlit and sandy places. The nests are deep and therefore the brood cells are warm and humid. Such conditions are favorable for the development of the beewolf larvae; however, they also foster the growth of mold fungi. As a matter of fact, bees stored under such conditions in the lab were overgrown by mold within one to three days.

Read more

Jun 11, 2019

Protecting our energy infrastructure from cyberattack

Posted by in categories: cybercrime/malcode, nuclear energy

Almost every day, news headlines announce another security breach and the theft of credit card numbers and other personal information. While having one’s credit card stolen can be annoying and unsettling, a far more significant, yet less recognized, concern is the security of physical infrastructure, including energy systems.

“With a credit card theft, you might have to pay $50 and get a new credit card,” says Stuart Madnick, the John Norris Maguire Professor of Information Technologies at the Sloan School of Management, a professor of engineering systems at the School of Engineering, and founding director of the Cybersecurity at MIT Sloan consortium. “But with infrastructure attacks, real physical damage can occur, and recovery can take weeks or months.”

A few examples demonstrate the threat. In 2008, an alleged blew up an oil pipeline in Turkey, shutting it down for three weeks; in 2009, the malicious Stuxnet computer worm destroyed hundreds of Iranian centrifuges, disrupting that country’s nuclear fuel enrichment program; and in 2015, an attack brought down a section of the Ukrainian power grid—for just six hours, but substations on the grid had to be operated manually for months.

Continue reading “Protecting our energy infrastructure from cyberattack” »

Jun 11, 2019

New computer attack mimics user’s keystroke characteristics and evades detection

Posted by in categories: cybercrime/malcode, robotics/AI

Ben-Gurion University of the Negev (BGU) cyber security researchers have developed a new attack called Malboard evades several detection products that are intended to continuously verify the user’s identity based on personalized keystroke characteristics.

The new paper, “Malboard: A Novel User Keystroke Impersonation Attack and Trusted Detection Framework Based on Side-Channel Analysis,” published in the Computer and Security journal, reveals a sophisticated attack in which a compromised USB automatically generates and sends malicious keystrokes that mimic the attacked user’s behavioral characteristics.

Keystrokes generated maliciously do not typically match human typing and can easily be . Using artificial intelligence, however, the Malboard attack autonomously generates commands in the user’s style, injects the keystrokes as malicious software into the keyboard and evades detection. The keyboards used in the research were products by Microsoft, Lenovo and Dell.

Continue reading “New computer attack mimics user’s keystroke characteristics and evades detection” »

Jun 11, 2019

US moves to tackle scourge of ‘robocalls’

Posted by in category: robotics/AI

“Hello? Who’s calling?” For many Americans these days, the call is coming from a “bot” or automated program that seeks to trick them into giving up money or important personal data.

The scourge of “robocalls” by the billions has prompted US regulators to adopt new rules allowing carriers to implement tools to block calls with suspicious origins.

The automated calls may tell respondents that they owe back taxes or other bills that need to be settled immediately, or direct them to call numbers where they are charged for the connection.

Continue reading “US moves to tackle scourge of ‘robocalls’” »