Menu

Blog

Archive for the ‘security’ category: Page 136

Dec 31, 2015

John McAfee says his new security product is a ‘f—ing game changer’

Posted by in categories: encryption, geopolitics, military, security

It’s an interesting idea, if not an original one. (it’s not) The problem is that, military grade encryption or not, it would be a single point of failure that could compromise your on AND offline security in one fell swoop.


Fugitive presidential candidate John McAfee is going back to his roots with a new security product that he calls “a f—ing game changer.”

Read more

Dec 16, 2015

Russia, China Building ‘Robot’ Army

Posted by in categories: business, ethics, military, robotics/AI, security

Despite more than a thousand artificial-intelligence researchers signing an open letter this summer in an effort to ban autonomous weapons, Business Insider reports that China and Russia are in the process of creating self-sufficient killer robots, and in turn is putting pressure on the Pentagon to keep up.

“We know that China is already investing heavily in robotics and autonomy and the Russian Chief of General Staff [Valery Vasilevich] Gerasimov recently said that the Russian military is preparing to fight on a roboticized battlefield,” U.S. Deputy Secretary of Defense Robert Work said during a national security forum on Monday.

Work added, “[Gerasimov] said, and I quote, ‘In the near future, it is possible that a complete roboticized unit will be created capable of independently conducting military operations.’”

Read more

Dec 12, 2015

Technology Will Save Our Future, According To Japanese SF Author Taiyo Fujii

Posted by in categories: augmented reality, engineering, genetics, security

I’ve been increasingly interested in translated science fiction novels, and one of the best ones that I picked up this year was Taiyo Fujii’s debut Gene Mapper.

Gene Mapper takes place in a future where augmented reality and genetic engineering is commonplace. When a freelance gene mapper named Hayashida finds that a project that he had worked on is collapsing, he believes that it’s being sabotaged. Determined to fix it, he travels to Vietnam where he finds that there’s more behind the problem than he initially thought.

You can read a tie-in story over on Lightspeed Magazine, ‘Violation of the TrueNet Security Act’.

Read more

Nov 27, 2015

Airbus Patents Way to Board Planes That’s Straight out of Sci-Fi

Posted by in categories: security, transportation

If the Airbus patent ever becomes reality, this boarding style would be a thing of the past. (Photo: Thinkstock)

Unless you’re deathly afraid of planes, one of the worst things about flying is the sheer tedium of it. It’s nothing but indeterminate waiting — waiting for security, waiting to board, waiting to reach your destination.

Airbus has just been granted a patent for a wild new way to try to speed up boarding on planes — and as Ars Technica points out, it’s just like something out of the classic kids TV show Thunderbirds.

Read more

Nov 25, 2015

Inkjet hologram printing now possible

Posted by in categories: chemistry, materials, security

Vivid holographic images and text can now be produced by means of an ordinary inkjet printer. This new method, developed by a team of scientists from ITMO University in Saint Petersburg, is expected to significantly reduce the cost and time needed to create the so-called rainbow holograms, commonly used for security purposes — to protect valuable items, such as credit cards and paper currency, from piracy and falsification. The results of the study were published 17 November in the scientific journal Advanced Functional Materials.

The team, led by Alexander Vinogradov, senior research associate at the International Laboratory of Solution Chemistry of Advanced Materials and Technologies (SCAMT) in ITMO University, developed colorless ink made of nanocrystalline titania, which can be loaded into an inkjet printer and then deposited on special microembossed paper, resulting in unique patterned images. The ink makes it possible to print custom holographic images on transparent film in a matter of minutes, instead of days as with the use of conventional methods.

Rainbow holograms are widely used to fight against the forgery of credit cards, money, documents and certain manufactured products that call for a high level of protection. Even though the technology of obtaining holographic images was already developed in the 1960s, there still exist numerous technical difficulties that impede its further spread and integration into polygraphic industry.

Read more

Nov 23, 2015

BITNATION @ The Keiser Report

Posted by in categories: governance, security

BITNATION : Governance 2.0

Bitnation provides the same services traditional governments provides, from dispute resolution and insurance to security and much more.

Continue reading “BITNATION @ The Keiser Report” »

Nov 20, 2015

Moore Foundation Gives Stanford $13.5 Million To Build “Accelerator on a Chip”

Posted by in categories: biotech/medical, computing, electronics, mobile phones, particle physics, security

Today’s particle accelerators are massive machines, but physicists have been working on shrinking them down to tabletop scales for years. The Gordon and Betty Moore Foundation just awarded a $13.5 million grant to Stanford University to develop a working “accelerator on a chip” the size of a shoebox over the next five years.

The international collaboration will build on prior experiments by physicists at SLAC/Stanford and Germany’s Friedrich-Alexander University in Erlangen-Nuremberg. If successful, the prototype could usher in a new generation of compact particle accelerators that could fit on a laboratory bench, with potential applications in medical therapies, x-ray imaging, and even security scanner technologies.

The idea is to “do for particle accelerators what the microchip industry did for computers,” SLAC National Accelerator Laboratory physicist Joel England told Gizmodo. Computers used to fill entire rooms back when they relied on bulky vacuum tube technology. The invention of the transistor and subsequent development of the microchip made it possible to shrink computers down to laptop and cell phone scales. England envisions a day when we might be able to build a handheld particle accelerator, although “there’d be radiation issues, so you probably wouldn’t want to hold one in your hand.”

Read more

Nov 19, 2015

France votes to give government powers to block online communications during state of emergency — By Paul Sauers | VentureBeat

Posted by in categories: government, internet, law, policy, security

French-Flag-Arc-de-Triomphe

“French members of parliament (MPs) have voted to give the government extra powers to block online communications when the country is under a “state of emergency.””

Read more

Nov 19, 2015

Los Alamos National Laboratory Orders a 1000+ Qubit D-Wave 2X Quantum Computer

Posted by in categories: computing, quantum physics, security

D-Wave Systems Inc., the world’s first quantum computing company, announced that Los Alamos National Laboratory will acquire and install the latest D-Wave quantum computer, the 1000+ qubit D-Wave 2X™ system. Los Alamos, a multidisciplinary research institution engaged in strategic science on behalf of national security, will lead a collaboration within the Department of Energy and with select university partners to explore the capabilities and applications of quantum annealing technology, consistent with the goals of the government-wide National Strategic Computing Initiative. The National Strategic Computing Initiative, created by executive order of President Barack Obama in late July, is intended “to maximize [the] benefits of high-performance computing (HPC) research, development, and deployment.”

“Eventually Moore’s Law (that predicted that the number of transistors on an integrated circuit would double every two years) will come to an end,” said John Sarrao, associate director for Theory, Simulation, and Computation at Los Alamos. “Dennard Scaling (that predicted that performance per watt of computing would grow exponentially at roughly the same rate) already has. Beyond these two observations lies the end of the current ‘conventional’ computing era, so new technologies and ideas are needed.”

“As conventional computers reach their limits in terms of scaling and performance per watt, we need to investigate new technologies to support our mission,” said Mark Anderson of the Laboratory’s Weapons Physics Directorate. “Researching and evaluating quantum annealing as the basis for new approaches to address intractable problems is an essential and powerful step, and will enable a new generation of forward thinkers to influence its evolution in a direction most beneficial to the nation.”

Read more

Nov 13, 2015

Google reportedly planning a ‘watershed’ quantum computing announcement for December 8

Posted by in categories: computing, quantum physics, security

Interesting…


According to Steve Jurvetson, venture capitalist and board member at pioneer quantum computing company D-WAVE (as well as others, such as Tesla and SpaceX), Google has what may be a “watershed” quantum computing announcement scheduled for early next month. This comes as D-WAVE, which notably also holds the Mountain View company as a customer, has just sold a 1000+ Qubit 2X quantum computer to national security research institution Los Alamos…

It’s not exactly clear what this announcement will be (besides important for the future of computing), but Jurvetson says to “stay tuned” for more information coming on December 8th. This is the first we’ve heard of a December 8th date for a Google announcement, and considering its purported potential to be a turning point in computing, this could perhaps mean an actual event is in the cards.

Continue reading “Google reportedly planning a ‘watershed’ quantum computing announcement for December 8” »