Menu

Blog

Archive for the ‘security’ category: Page 106

Mar 26, 2018

This blockchain-based surveillance startup detects crime in real-time

Posted by in categories: bitcoin, computing, neuroscience, security, surveillance

A security company wants to modernize the “backward-looking” and “inherently inefficient” video surveillance industry by offering a blockchain-based system which allows users to react to threats in real time.

Faceter’s decentralized surveillance technology – which it claims is a world first for consumers – “gives brains to cameras” by enabling them to instantly detect faces, objects and analyze video feeds. Although some B2B providers do offer similar features, the company claims they are currently too expensive for smaller firms and the public at large because of the “substantial computing resources” such technology needs.

According to Faceter’s white paper, Blockchain has the potential to make this solution affordable for everyone – as computing power for recognition calculations would be generated by a network of miners.

Continue reading “This blockchain-based surveillance startup detects crime in real-time” »

Mar 23, 2018

Researchers find a new material for quantum computing

Posted by in categories: computing, engineering, quantum physics, security

Rumors of commercial quantum computing systems have been coming hot and heavy these past few years but there are still a number of issues to work out in the technology. For example, researchers at the Moscow Institute Of Physics And Technology have begun using silicon carbine to create a system to release single photons in ambient i.e. room temperature conditions. To maintain security quantum computers need to output quantum bits – essentially single photons. This currently requires a supercooled material that proves to be unworkable in the real world. From the release:

Photons — the quanta of light — are the best carriers for quantum bits. It is important to emphasize that only single photons can be used, otherwise an eavesdropper might intercept one of the transmitted photons and thus get a copy of the message. The principle of single-photon generation is quite simple: An excited quantum system can relax into the ground state by emitting exactly one photon. From an engineering standpoint, one needs a real-world physical system that reliably generates single photons under ambient conditions. However, such a system is not easy to find. For example, quantum dots could be a good option, but they only work well when cooled below −200 degrees Celsius, while the newly emerged two-dimensional materials, such as graphene, are simply unable to generate single-photons at a high repetition rate under electrical excitation.

Researchers used silicon carbide in early LEDs and has been used to create electroluminescent electronics in the past. This new system will allow manufacturers to place silicon carbide emitters right on the quantum computer chips, a massive improvement over the complex systems used today.

Continue reading “Researchers find a new material for quantum computing” »

Mar 20, 2018

‘Your Genome Isn’t Really Secret,’ Says Google Ventures’s Bill Maris

Posted by in categories: biotech/medical, security

The venture capitalist wants to extend human life expectancy, and he says fears over privacy and the security of DNA data shouldn’t stand in the way.

Read more

Feb 28, 2018

A National Machine Intelligence Strategy for the United States

Posted by in categories: business, economics, policy, robotics/AI, security, transportation

This event will be webcast live from this page.

The Technology Policy Program invites you to the launch of our upcoming report, A National Machine Intelligence Strategy for the United States.

Continue reading “A National Machine Intelligence Strategy for the United States” »

Feb 27, 2018

Norway’s Global Seed Vault set for multimillion-dollar fortification

Posted by in categories: business, existential risks, food, security

It has proposed spending a total of US$12.7 million on technical upgrades to the vault to better protect the more than 930,000 seed varieties inside. It has completed a feasibility study and plans to move ahead with the construction of a new concrete access tunnel and a new service building for the emergency power, refrigeration units and electrical equipment.


Global food security is serious business, and when you have water seeping into a doomsday facility built to shore up food supplies for the future, well, that’s hardly ideal. But such breaches should be a thing of the past, with Norwegian authorities overseeing the Svalbard Global Seed Vault planning a multi-million dollar overhaul of the structure.

Read more

Feb 25, 2018

Could Elon Musk Lose the Satellite Market — and Win the Solar System?

Posted by in categories: Elon Musk, satellites, security

When SpaceX launched the world’s biggest rocket ship on Feb. 6, that kind of seemed like a big deal — but not everyone is impressed.

Previewing the SpaceX Falcon Heavy launch, The Wall Street Journal seemed perplexed. Yes, the Falcon Heavy is big, admitted the Journal. But as a “heavy-lift booster,” it said, it is a product designed to serve a market that’s suffering “significantly eroded commercial demand” and “uncertain commercial prospects.”

The problem, as the Journal (correctly) pointed out, is that thanks to advances in rocketry, electronics, and materials technology, “both national security and corporate satellites continue to get smaller and lighter” (and cheaper).

Continue reading “Could Elon Musk Lose the Satellite Market -- and Win the Solar System?” »

Feb 17, 2018

The Quantum Internet Has Arrived (and It Hasn’t)

Posted by in categories: computing, internet, quantum physics, security

Networks that harness entanglement and teleportation could enable leaps in security, computing and science.

Read more

Feb 13, 2018

Decentralized Digital Identities and Blockchain – The Future as We See It

Posted by in categories: bitcoin, food, neuroscience, security

Howdy folks.

I hope you’ll find today’s post as interesting as I do. It’s a bit of brain candy and outlines an exciting vision for the future of digital identities.

Over the last 12 months we’ve invested in incubating a set of ideas for using Blockchain (and other distributed ledger technologies) to create new types of digital identities, identities designed from the ground up to enhance personal privacy, security and control. We’re pretty excited by what we’ve learned and by the new partnerships we’ve formed in the process. Today we’re taking the opportunity to share our thinking and direction with you. This blog is part of a series and follows on Peggy Johnson’s blog post announcing that Microsoft has joined the ID2020 initiative. If you haven’t already Peggy’s post, I would recommend reading it first.

Continue reading “Decentralized Digital Identities and Blockchain – The Future as We See It” »

Feb 5, 2018

Former Intel president launches new chip company with backing from Carlyle Group — By Ron Miller | TechCrunch

Posted by in categories: business, computing, security

Ampere, a new chip company run by former Intel president Renee James, came out of stealth today with a brand-new highly efficient Arm-based server chip targeted at hyperscale data centers.”

Read more

Jan 21, 2018

In Space and Cyber, China is Closing In on the United States

Posted by in categories: encryption, robotics/AI, satellites, security

WASHINGTON — It should be no surprise that China is moving to challenge the United States for dominance in space, cyber, artificial intelligence and other key technologies that have wide national security applications. But the question that is still being debated is whether the United States is taking this threat seriously.

This may not be a Sputnik moment, but the United States could soon be unpleasantly surprised as China continues to shore up its domestic capacity to produce high-end weapons, satellites and encryption technologies, a panel of analysts told the House Armed Services emerging threats and capabilities subcommittee.

At the Tuesday hearing, Subcommittee Chairman Rep. Elise Stefanik, R-N.Y., said lawmakers are not entirely convinced that China’s dominance in many technology sectors is a “foregone conclusion.” But the committee does believe that China’s technological accomplishments should inform U.S. policies and defense investments. [The Most Dangerous Space Weapons Concepts Ever].

Continue reading “In Space and Cyber, China is Closing In on the United States” »