Menu

Blog

Archive for the ‘internet’ category: Page 265

Aug 14, 2016

WEF: These are the technologies that will transform finance over the next few decades

Posted by in categories: biotech/medical, computing, finance, internet, mobile phones, privacy, security, singularity

Like this article; there is 2 more pieces missing from the roadmap for 2010 & beyond and that is Biocomputing & Singularity. Biocomputing will provide the financial industry (banks, trading firms, accounting & audit firms, bond insurers, etc.) the ability to expand information/ data storage and transmission capacities like we have never see before just look at what Microsoft, Google, Amazon, etc. have done with DNA storage. And, the much loved Singularity enables boosting of knowledge and insights as well as more mobility and access to information as they need it. BTW — Biometrics is NOT the same as Biocomputing; biocomputing goes well beyond security/ identity management.


The influential non-profit rates these technologies alongside the PC, the internet, and smartphones in terms of their potential to transform financial…

Read more

Aug 11, 2016

Lock picking your way to cybersecurity at Def Con

Posted by in categories: cybercrime/malcode, internet

New method on how to attend Def Con.


LAS VEGAS (AP) — Lock picking might seem ridiculously old-fashioned at a cybersecurity gathering — but learning it can actually help people protect machines from digital threats.

As security improves to block remote attacks over the internet, hackers look for ways to deliver malicious software physically instead — for instance, by breaking into a company’s data centers. Like cracking a digital system, picking locks involves solving puzzles, along with a certain amount of finesse and skill.

Continue reading “Lock picking your way to cybersecurity at Def Con” »

Aug 9, 2016

DARPA competition sees dawn of autonomous IoT hacking

Posted by in categories: cybercrime/malcode, internet, military, quantum physics, robotics/AI

Glad folks realizes and admit to the risks; however, I stand by my argument until the underpinning technology is still tied to dated digital technology; it will be hacked by folks like China who are planning to be on a new Quantum network and platforms. Reason why all countries must never lose sight of replacing their infrastructure and the net with Quantum technology.


A team of researchers from Pittsburgh has won DARPA’s Cyber Grand Challenge – a competition billed as the ‘world’s first automated network defense tournament.’ The implications for the Internet of Things (IoT) are grave, as the machines on display threaten to ravage the already flaky state of IoT security.

DARPA, the Department of Defense’s (DoD) Defense Advanced Research Projects Agency, is a wing of the US military that investigates how the latest technological breakthroughs can be put to use on the battlefield. With nation-state cybersecurity now declared a new front in conventional warfare, militaries around the world will be flocking to gather the tools needed to exert force in this new medium.

Continue reading “DARPA competition sees dawn of autonomous IoT hacking” »

Aug 8, 2016

Pioneering research in parallel optical interconnect technology for cloud computing

Posted by in categories: computing, internet, military

New way for IoT and data centers in general to improve energy use, costs, etc.


Arrays based on vertical-cavity surface-emitting lasers offer a high-bandwidth, low-power, and low-cost solution for intra-data centers.

Continue reading “Pioneering research in parallel optical interconnect technology for cloud computing” »

Aug 8, 2016

Scientists Create Language to Program Living Cells

Posted by in categories: biotech/medical, computing, education, internet

Nice — another step forward for all things connected.


Scientists can now talk to and even command living cells–to a limited degree at the moment, but with massive implications for the future. MIT biological engineers have created a computer code that allows them to basically hijack living cells and control them. It works similarly to a translation service, using a programming language to create a function for a cell in the form of a DNA sequence. Once it’s scalable, the invention has major ramifications. Future applications could include designing cells that produce a cancer drug when a tumor is detected or creating yeast cells that halt their own fermentation if too many toxic byproducts build up.

Continue reading “Scientists Create Language to Program Living Cells” »

Aug 8, 2016

IBM scientists emulate neurons with phase-change technology

Posted by in categories: computing, finance, internet

A prototype chip with large arrays of phase-change devices that store the state of artificial neuronal populations in their atomic configuration. The devices are accessed via an array of probes in this prototype to allow for characterization and testing. The tiny squares are contact pads used to access the nanometer-scale phase-change cells (inset). Each set of probes can access a population of 100 cells. There are thousands to millions of these cells on one chip and IBM accesses them (in this particular photograph) by means of the sharp needles (probe card). (credit: IBM Research)

Scientists at IBM Research in Zurich have developed artificial neurons that emulate how neurons spike (fire). The goal is to create energy-efficient, high-speed, ultra-dense integrated neuromorphic (brain-like) technologies for applications in cognitive computing, such as unsupervised learning for detecting and analyzing patterns.

Continue reading “IBM scientists emulate neurons with phase-change technology” »

Aug 4, 2016

These disasters are inevitable if Google becomes Obsolete

Posted by in categories: futurism, internet

This article is hilarious! If Google ever becomes obsolete it will do so because a new tech player with new technology took over. Too say the world will collapse or panic will happen is not reality. Anyone who remembers DEC/ Digital Corporation, WANG, etc. will tell you that a tech company often becomes obsolete when the masses / users drop the company’s tech for another competitor; and this process typically takes a few years of decline when it happens.


In this time of the internet when we have a vast amount of information available that we can easily Google to find out. This search engine has proven itself to be the most efficient tool for the entire humanity. But imagine what will happen if Google becomes obsolete or shuts down entirely at some point in the future.

Considering all the vast ranges of functionalities Google can perform, I believe the aftermath will be devastating. In fact, Google did shut down once, for a few minutes and the whole world turned upside-down.

Continue reading “These disasters are inevitable if Google becomes Obsolete” »

Aug 3, 2016

The ESA Will Study the Wind

Posted by in categories: internet, space

Hmmmm; ok.


Finally, lasers will figure out what the deal with wind is.

Read more

Aug 3, 2016

Russian web hosting service a favorite among cybercriminals

Posted by in categories: cybercrime/malcode, internet

A Russian web hosting service is providing an avenue for cybercriminals to set up sites for selling stolen passwords, credit cards, and other pilfered personal information, a cybersecurity firm said.

The web hosting company Deer.io has become popular among online thieves because it’s easy to use and asks few questions from users, said Rick Holland, vice president of strategy at the cybersecurity firm Digital Shadows, on Tuesday at the Black Hat cybersecurity conference in Las Vegas.

Continue reading “Russian web hosting service a favorite among cybercriminals” »

Aug 2, 2016

DARPA-Funded Project Could Develop New Technique for Wirelessly Monitoring Malicious Software on IoT Devices

Posted by in categories: internet, security

Could this help on the whole IoT security challenge — TBD.


A $9.4 million grant from the Defense Advanced Research Projects Agency (DARPA) could lead to development of a new technique for wirelessly monitoring Internet of Things (IoT) devices for malicious software – without affecting the operation of the ubiquitous but low-power equipment.

The technique will rely on receiving and analyzing side-channel signals, electromagnetic emissions that are produced unintentionally by the electronic devices as they execute programs. These signals are produced by semiconductors, capacitors, power supplies and other components, and can currently be measured up to a half-meter away from operating IoT devices.

Continue reading “DARPA-Funded Project Could Develop New Technique for Wirelessly Monitoring Malicious Software on IoT Devices” »