Menu

Blog

Archive for the ‘security’ category: Page 125

May 21, 2016

Computing a secret, unbreakable key

Posted by in categories: computing, quantum physics, security

Awesome.


What once took months by some of the world’s leading scientists can now be done in seconds by undergraduate students thanks to software developed at the University of Waterloo’s Institute for Quantum Computing, paving the way for fast, secure quantum communication.

Researchers at the Institute for Quantum Computing (IQC) at the University of Waterloo developed the first available software to evaluate the security of any protocol for Quantum Key Distribution (QKD).

Continue reading “Computing a secret, unbreakable key” »

May 14, 2016

Nanotechnology To Make Holographic Applications More Secure And Efficient

Posted by in categories: biotech/medical, encryption, nanotechnology, security

Making Holographic Apps more secured and efficient.


Since its birth, holograms have been extensively used to serve security systems and related purposes. The making of a hologram, dissecting it to pieces and again rejoining the blocks involves a steady orientation of lenses which encodes the information with depth perception that could be deciphered later according to requirement.

It’s hard to imagine a 21st century city running smooth without an immense use of holograms, small or big sized 2D cards with 3D engraved pictures that are present in credit cards, grocery objects, books, biomedical devices and in other objects requiring retrievable information to be stored.

Continue reading “Nanotechnology To Make Holographic Applications More Secure And Efficient” »

May 13, 2016

Pentagon News And Updates: Reveals Amazing Technology; DARPA Enters Pentagon’s Domain With Game Changer Tech For Security

Posted by in categories: military, security

https://youtube.com/watch?v=Gd3tN4H0NjY

Pentagon and DARPA’s path collide to showcase game changing technology.

Read more

May 12, 2016

Advisory Committee expresses Quantum, legacy system concerns

Posted by in categories: military, privacy, quantum physics, security

NSA meets with Silicon Valley execs to voice their concerns over legacy systems being hacked by Quantum technology. Glad they’re talking about it because with the recent advancements in Quantum means it will be available in devices, communications, and platforms a lot sooner than originally projected.


The National Security Telecommunications Advisory Committee (NSTAC) brought together Silicon Valley executives with federal officials at the advisory committee’s annual meeting on Wednesday in Santa Clara, California.

U.S. military and intelligence officials, including Department of Defense Secretary Ash Carter, Department of Homeland Security Secretary Jeh Johnson, and Department of Commerce Secretary Penny Pritzker, attended the advisory committee.

Continue reading “Advisory Committee expresses Quantum, legacy system concerns” »

May 11, 2016

America is ‘dropping cyberbombs’ – but how do they work — By Richard Forno and Anupam Joshi | The Conversation

Posted by in category: security

Soldiers wrapped up day two of an integrated cyber exercise between 4th Battalion, 23rd Infantry, 14th Brigade Engineer Battalion, 201st Expeditionary Military Intelligence Brigade, from Joint Base Lewis-McChord, Wash., supported by cyber augmentees from the 780th Military Intelligence Brigade from Fort Meade, Md., Oct. 21. Cyber information collected during the exercise enabled the Soldiers to isolate and capture a simulated high-value target in a mock village. The training integrates infantry ground units with cyber, signal and human intelligence collection capabilities, which gives units on the modern battlefield a broader capacity to search out and isolate their enemies in real time. (Photo by Capt. Meredith Mathis)

“Recently, United States Deputy Defense Secretary Robert Work publicly confirmed that the Pentagon’s Cyber Command was “dropping cyberbombs,” taking its ongoing battle against the Islamic State group into the online world. Other American officials, including President Barack Obama, have discussed offensive cyber activities, too.”

Read more

May 10, 2016

US investigates security of mobile devices

Posted by in categories: electronics, mobile phones, security

Not saying that the whole Apple situation cause this; it just odd timing.


The Federal Communications Commission and Federal Trade Commission have asked mobile phone carriers and manufacturers to explain how they release security updates amid mounting concerns over security vulnerabilities, the U.S. agencies said on Monday.

The agencies have written to Apple, AT&T and Alphabet, among others, in order “to better understand, and ultimately to improve, the security of mobile devices,” the FCC said.

Continue reading “US investigates security of mobile devices” »

May 10, 2016

Technology Will Replace the Need for Big Government

Posted by in categories: employment, government, habitats, robotics/AI, security

My new article on how some technologies will inevitably make the government smaller:


However, there’s reason to believe that in the near future, government might dramatically shrink—not because of demands by fiscally astute Americans, but because of radical technology.

Indubitably, millions of government jobs will soon be replaced by robots. Even the US President could one day be replaced, which—strangely enough—might bring sanity to our election process.

Continue reading “Technology Will Replace the Need for Big Government” »

May 9, 2016

DOE opens funding opportunity for biofuels, bioproducts, biopower

Posted by in categories: climatology, economics, food, security, sustainability

Recognizing the importance of biofuels to energy and climate security, the U.S. Department of Energy has announced up to $90 million in project funding focused on designing, constructing and operating integrated biorefinery facilities. The production of biofuels from sustainable, non-food, domestic biomass resources is an important strategy to meet the Administration’s goals to reduce carbon emissions and our dependence on imported oil.

Project Development for Pilot and Demonstration Scale Manufacturing of Biofuels, Bioproducts, and Biopower is a funding opportunity meant to assist in the construction of bioenergy infrastructure to integrate cutting-edge pretreatment, process, and convergence technologies. Biorefineries are modeled after petroleum refineries, but use domestic biomass sources instead of crude oil, or other fossil fuels to produce biofuels, bioproducts, and biopower. They convert biomass feedstocks—the plant and algal materials used to derive fuels like ethanol, butanol, biodiesel and other hydrocarbon fuels—to another form of fuel or energy product. This funding will support efforts to improve and demonstrate processes that break down complex biomass feedstocks and convert them to gasoline, diesel and jet fuel, as well as plastics and chemicals.

“The domestic bio-industry could play an important part in the growing clean energy economy and in reducing American dependence on imported oil,” said Lynn Orr, DOE’s under secretary for science and energy. “This funding opportunity will support companies that are working to advance current technologies and help them overcome existing challenges in bioenergy so the industry can meet its full potential.”

Continue reading “DOE opens funding opportunity for biofuels, bioproducts, biopower” »

May 7, 2016

Disrupting manufacturing: Innovation and the future of skilled labor

Posted by in categories: education, habitats, robotics/AI, security

Again, we all must ask ourselves “What is it that we all need and want v. being told what we need and want by a 20 something old who gets take out or heats up a tv dinner, etc. And, truly what makes sense from an investment, ROI, and security risk adverse investment approach.” 1st, I like making and having my own choices in how I run my house, and operating style at work and private life. 2nd, I don’t trust our out dated digital infrastructure to warrant a great investment in all things AI.

Until I see AI that assist me instead of trying to work against me or replace me as well as having security; then not bought in 100%.


The U.S. manufacturing sector has changed rapidly in the last decade and continues to change as new techonolgy innovations emerge. Daniel Araya and Christopher Sulavik discuss how schools can react to educate a skilled labor force for this new era of robot technolgies.

Continue reading “Disrupting manufacturing: Innovation and the future of skilled labor” »

May 4, 2016

Laser Brain Cancer Treatment May Offer Extra Advantage

Posted by in categories: biotech/medical, neuroscience, security

Neurosurgeons using lasers to treat brain cancer have discovered that the technique breaks down the blood-brain barrier, a finding that could lead to new treatment options for patients with the deadly disease.

The blood-brain barrier is sort of a natural “security system” that shields the brain from toxins in the blood but also blocks potentially helpful drugs such as those used in chemotherapy.

“We were able to show that this blood-brain barrier is broken down for about four weeks after you do this laser therapy,” said Dr. Eric Leuthardt, a professor of neurosurgery at Washington University in St. Louis. “So not only are you killing the tumor, you are actually opening up a window of opportunity to deliver various drugs and chemicals and therapies that could otherwise not get there.”

Continue reading “Laser Brain Cancer Treatment May Offer Extra Advantage” »