Page 10744
Nov 15, 2016
Voting On The Blockchain — Fred Wilson | AVC
Posted by Odette Bohr Dienel in categories: computing, cryptocurrencies
“I haven’t placed a vote on a blockchain yet, but it’s so simple to do that I expect I will be doing it frequently soon enough.”
Tag: blockchain
Nov 15, 2016
Mobile If Apple Builds Smart Glasses, They’d Better Be Spectacular — By Jamie Condliffe | MIT Technology Review
Posted by Odette Bohr Dienel in categories: augmented reality, business
” … Apple is considering the idea of producing digital glasses. The specs would, we’re told, “connect wirelessly to iPhones, show images and other information in the wearer’s field of vision, and may use augmented reality.””
Tag: Apple
Nov 15, 2016
Genetic variants linked to education predict longevity
Posted by Steve Hill in categories: education, genetics, life extension
More supporting data that higher education is good for longevity.
National Academy of Sciences.
Nov 15, 2016
At Sundar Pichai’s Google, AI Is Everything–And Everywhere
Posted by Klaus Baldauf in category: robotics/AI
A year into his tenure as CEO of Google, the low-key leader talks about what the company is, where it’s going, and how it gets things done.
Trailer for Ghost in the Shell.
Based on the internationally-acclaimed sci-fi property, Ghost in the Shell follows Major, a special ops, one-of-a-kind human-cyborg hybrid, who leads the elite task force Section 9. Devoted to stopping the most dangerous criminals and extremists, Section 9 is faced with an enemy whose singular goal is to wipe out Hanka Robotic’s advancements in cyber technology.
Nov 14, 2016
Coming to Grips with Artificial Intelligence’s Many Manifestations
Posted by Karen Hurst in categories: habitats, robotics/AI, transportation
The categories of AI.
Click here to learn more about author James Kobielus.
Artificial intelligence (AI) is all the rage these days. However, people often overlook the fact that it’s a truly ancient vogue. I can’t think of another current high-tech mania whose hype curve got going during the days when Ike was in the White House, “I Love Lucy” was on the small screen, and programming in assembly language was state of the art.
Continue reading “Coming to Grips with Artificial Intelligence’s Many Manifestations” »
Nov 14, 2016
Citywide test of DARPA’s radioactive threat detection system complete
Posted by Karen Hurst in category: electronics
Not trying to throw stones; however, why didn’t they just connect with the DoE as they already (for 2 decades) had an real-time solution doing this type of tracking.
WASHINGTON, Nov. 14 (UPI) — The U.S. Defense Advanced Research Projects Agency has completed the first citywide assessment of its SIGMA radioactive threat detection system.
Continue reading “Citywide test of DARPA’s radioactive threat detection system complete” »
Nov 14, 2016
CertiKOS: A Step Toward Hacker-Resistant Operating Systems
Posted by Karen Hurst in categories: cybercrime/malcode, internet, robotics/AI
Researchers from Yale University have unveiled CertiKOS, the world’s first operating system that runs on multi-core processors and shields against cyber-attacks. Scientists believe this could lead to a new generation of reliable and secure systems software.
Led by Zhong Shao, professor of computer science at Yale, the researchers developed an operating system that incorporates formal verification to ensure that a program performs precisely as its designers intended — a safeguard that could prevent the hacking of anything from home appliances and Internet of Things (IoT) devices to self-driving cars and digital currency. Their paper on CertiKOS was presented at the 12th USENIX Symposium on Operating Systems Design and Implementation held Nov. 2–4 in Savannah, Ga.
Computer scientists have long believed that computers’ operating systems should have at their core a small, trustworthy kernel that facilitates communication between the systems’ software and hardware. But operating systems are complicated, and all it takes is a single weak link in the code — one that is virtually impossible to detect via traditional testing — to leave a system vulnerable to hackers.
Continue reading “CertiKOS: A Step Toward Hacker-Resistant Operating Systems” »