Toggle light / dark theme

This paper attempts to apply artificial intelligence (AI) to computer network technology and research on the application of AI in computing network technology.

With the continuous expansion of the application scope of computer network technology, various malicious attacks that exist in the Internet range have caused serious harm to computer users and network resources.

By studying the attack principle, analyzing the characteristics of the attack method, extracting feature data, establishing feature sets, and using the agent technology as the supporting technology, the simulation experiment is used to prove the improvement effect of the system in terms of false alarm rate, convergence speed, and false-negative rate, the rate reached 86.7%. The results show that this fast algorithm reduces the training time of the network, reduces the network size, improves the classification performance, and improves the intrusion detection rate.

The development of technologies which can process information based on the laws of quantum physics are predicted to have profound impacts on modern society.

For example, quantum computers may hold the key to solving problems that are too complex for today’s most powerful supercomputers, and a quantum internet could ultimately protect the worlds information from malicious attacks.

However, these technologies all rely on “,” which is typically encoded in single quantum particles that are extremely difficult to control and measure.

This new “digital highway” centered on 5G will give rise to new industries and services previously unimagined. The United States must redouble its efforts to build such a digital infrastructure and make the commercialization of the Internet of Things a reality.


We’re on the verge of another industrial revolution. We can’t let the U.S. miss out.

Transhumanism can mean uploading one’s mind into cyberspace. But some transhumanists hope to slowly morph into “immortal cyborgs” with endlessly replaceable parts.

Five years ago, we were told, we were all turning into cyborgs:

Did you recently welcome a child into the world? Congratulations! An upstanding responsible parent such as yourself is surely doing all you can to prepare your little one for all the pitfalls life has in store. However, thanks to technology, children born in 2014 may face a far different set of issues than you ever had to. And we’re not talking about simply learning to master a new generation of digital doohickeys, we’re talking about living in a world in which the very definition of “human” becomes blurred.

Entanglement, once called “spooky action at a distance” by Einstein, is the phenomenon in which the quantum states of separated particles cannot be described independently. This puzzling phenomenon is widely exploited in the quantum physicist’s toolbox, and is a key resource for applications in secure quantum communication over long distances and quantum cryptography protocols. Unfortunately, entangled particles are easily disturbed by their surroundings, and their entanglement is readily diminished by the slightest interaction with the environment.

In a recent study published in the journal Physical Review X, an international team of physicists from Austria, Scotland, Canada, Finland and Germany have demonstrated how quantum can be strengthened to overcome particle loss or very high levels of noise, which are inevitable in real-life applications outside the laboratory. This strengthening is accomplished by departing from commonly used two-level quantum bits, or qubits. Qubits are bi-dimensional systems, the quantum analogue to the classical bit, with values zero or one. In this study, the researchers instead employed entanglement of systems with more than two levels. By entangling particles of light through their spatial and temporal properties, scientists have now observed the survival of quantum entanglement under harsh environmental conditions for the first time.

When it comes to distributing particles of light outside of a protected laboratory, the environmental conditions are identical to the tested ones. Therefore, the experiment is not only a proof-of-principle implementation, but is ready for long-distance quantum communication under real-world conditions. This new method could hence prove helpful for distributing entanglement in a future quantum internet.

The City of New Orleans has suffered a cybersecurity attack serious enough for Mayor LaToya Cantrell to declare a state of emergency.

The attack started at 5 a.m. CST on Friday, December 13, according to the City of New Orleans’ emergency preparedness campaign, NOLA Ready, managed by the Office of Homeland Security and Emergency Preparedness. NOLA Ready tweeted that “suspicious activity was detected on the City’s network,” and as investigations progressed, “activity indicating a cybersecurity incident was detected around 11 am.” As a precautionary measure, the NOLA tweet confirmed, the City’s IT department gave the order for all employees to power down computers and disconnect from Wi-Fi. All City servers were also powered down, and employees told to unplug any of their devices.

The power shift continues.


Uber, the world’s largest taxi company, owns no vehicles. Facebook, the world’s most popular media owner, creates no content. Alibaba, the most valuable retailer, has no inventory. And Airbnb, the world’s largest accommodation provider, owns no real estate. Something interesting is happening.

Since the Industrial Revolution, the world has developed complex supply chains, from designers to manufacturers, from distributors to importers, wholesalers and retailers, it’s what allowed billions of products to be made, shipped, bought and enjoyed in all corners of the world. In recent times the power of the Internet, especially the mobile phone, has unleashed a movement that’s rapidly destroying these layers and moving power to new places.

The Internet is the most powerful mechanism we can imagine to match perfectly individuals that need something, and people with something to offer. The moment started slowly by reducing complexity and removing the middle layer in the late 1990s. From insurance to early PC makers like Dell to travel agents, this time seemed to be an age where “direct” became a desirable moniker. This time seemed to favor scale and efficiency over service or brand, for commodities like insurance cover or processing power, the overheads of sales, marketing and retail footprint were stripped away.