Menu

Blog

Archive for the ‘security’ category

Oct 4, 2022

Linux 6.0 kernel enhances security with Runtime Verification, improves CPU energy efficiency

Posted by in categories: business, computing, internet, security

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

The open-source Linux operating system is an essential component of the cloud and enterprise application delivery. In fact, every cloud service, even Microsoft, offers Linux-based compute resources and Linux is often the default choice for embedded and internet of things (IoT) devices. Among the major Linux distribution vendors today are IBM’s Red Hat business unit, German vendor SUSE and Canonical, which develops the Ubuntu Linux distribution.

The market for Linux is forecast to grow to $22.15 billion by 2029, according to Fortune Business Insights, up from $6.27 billion in 2022.

Continue reading “Linux 6.0 kernel enhances security with Runtime Verification, improves CPU energy efficiency” »

Oct 3, 2022

What Can Brain Scans Really Tell Us?

Posted by in categories: biotech/medical, finance, genetics, neuroscience, robotics/AI, security

Since the infancy of functional magnetic resonance imaging (fMRI) in 1990, people have been fascinated by the potential for brain scans to unlock the mysteries of the human mind, our behaviors and beliefs. Many breathtaking applications for brain scans have been devised, but hype often exceeds what empirical science can deliver. It’s time to ask: What’s the big picture of neuroscience and what are the limitations of brain scans?

The specific aims of any research endeavor depend on who you ask and what funding agency is involved, says Michael Spezio, associate professor of psychology, data science and neuroscience at Scripps College. Some people believe neuroscience has the potential to explain human cognition and behavior as a fully mechanistic process, ultimately debunking an “illusion of free will.” Not all neuroscientists agree that free will is a myth, but it’s a strong current these days. Neuroscience also has applications in finance, artificial intelligence, weapons research and national security.

For other researchers and funders, the specific aim of neuroscience involves focusing on medical imaging, genetics, the study of proteins (proteomics) and the study of neural connections (connectomics). As caring persons who are biological, neurological, physical, social and spiritual, we can use neuroscience to think carefully and understand our humanity and possible ways to escape some of the traps we’ve built for ourselves, says Spezio. Also, brain scans can enhance research into spirituality, mindfulness and theory of mind – the awareness of emotions, values, empathy, beliefs, intentions and mental states to explain or predict others’ behavior.

Continue reading “What Can Brain Scans Really Tell Us?” »

Sep 30, 2022

How MLops deployment can be easier with open-source versioning

Posted by in categories: robotics/AI, security

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

Modern software development typically follows a very iterative approach known as continuous integration/continuous development (CI/CD). The promise of CI/CD is better software that is released quicker and it’s a promise that ClearML now intends to bring to the world of machine learning (ML).

ClearML today announced the general availability of its enterprise MLops platform that extends the capabilities of the company’s open-source edition. The ClearML Enterprise platform provides organizations with security controls and additional capabilities for rapidly iterating and deploying ML workflows.

Sep 23, 2022

15-Year-Old Unpatched Python Vulnerability Potentially Affects Over 350,000 Projects

Posted by in categories: robotics/AI, security

As many as 350,000 open source projects are believed to be potentially vulnerable to exploitation as a result of a security flaw in a Python module that has remained unpatched for 15 years.

The open source repositories span a number of industry verticals, such as software development, artificial intelligence/machine learning, web development, media, security, and IT management.

Continue reading “15-Year-Old Unpatched Python Vulnerability Potentially Affects Over 350,000 Projects” »

Sep 21, 2022

Dr. Andrew Hebbeler, Ph.D. — Office of Science and Technology Policy (OSTP) — The White House

Posted by in categories: biotech/medical, chemistry, health, policy, science, security, terrorism

Maximizing Benefits Of The Life Sciences & Health Tech For All Americans — Dr. Andrew Hebbeler, Ph.D., Principal Assistant Director for Health and Life Sciences, Office of Science and Technology Policy, The White House.


Dr. Andrew Hebbeler, Ph.D., is Principal Assistant Director for Health and Life Sciences, Office of Science and Technology Policy at The White House (https://www.whitehouse.gov/ostp/ostps-teams/health-and-life-sciences/), and has extensive foreign affairs, national security, global health, and science and technology (S&T) policy experience.

Continue reading “Dr. Andrew Hebbeler, Ph.D. — Office of Science and Technology Policy (OSTP) — The White House” »

Sep 19, 2022

A WiFi Deauthentication Project in a Sleek Package

Posted by in categories: education, internet, security, wearables

Wearable tech has seen an explosion of creativity and applications in the last decade; especially with circuit components getting smaller and cheaper, and batteries getting better and better. Whereas taking phone calls on your wrist was impressive just a few years ago, now, you can experiment with deauthentication attacks on WiFi networks just from this watch: the DSTIKE Deauther Watch SE.

Based on the ESP8266 WiFi microcontroller, this watch is the latest generation of a project to give you a wearable interface for pen testing local WiFi networks. The watch only works on 2.4GHz networks, due to the restrictions of the ESP8266. It comes pre-flashed with the latest ESP8266 Deauther firmware, which is an open-source project! The watch supports four main functions: a deauther attack, which disconnects all local 2.4GHz networks; deauther beacon, used for creating fake networks; deauther probe, to confuse any nearby WiFi trackers; and packet monitoring, which lets you display local WiFi traffic. As you can see, there’s a lot to appreciate in this slick and discreet package.


This watch (and its prior iterations) are made and sold by Travis Lin. Much like the seller emphasizes on the product page, this device is meant for educational purposes, and should be only tested on devices and networks you own. But if this has your curiosity piqued, put on your red hat and check out the wearable devices and other security goodies they have for sale!

Sep 17, 2022

Where are all the personal robots we were promised?

Posted by in categories: genetics, robotics/AI, security

These 15 robots may demonstrate that the concept is viable.

Personal robots have been a common trope in sci-fi for many decades. Their apparent plausibility has made many sci-fi enthusiasts wonder when they may become a reality.

Continue reading “Where are all the personal robots we were promised?” »

Sep 16, 2022

First light at the most powerful laser in the US

Posted by in categories: biotech/medical, quantum physics, security

The laser that will be the most powerful in the United States is preparing to send its first pulses into an experimental target at the University of Michigan.

Called ZEUS, the Zetawatt-Equivalent Ultrashort pulse System, it will explore the physics of the quantum universe as well as outer space, and it is expected to contribute to new technologies in medicine, electronics and national security.

Continue reading “First light at the most powerful laser in the US” »

Sep 13, 2022

Nation’s first security-focused, 5G wireless test range opens in Idaho

Posted by in categories: internet, security

NEWS MEDIA CONTACTS: Ethan Huffman, (208) 716‑4594, [email protected] Sarah Neumann, (208) 526‑0490, [email protected]

Sep 12, 2022

Lassa Fever: Symptoms Of Ebola-like Virus As First UK Death Confirmed

Posted by in categories: biotech/medical, health, security

Lassa fever is like ebola and there is an outbreak in Nigeria. It is transmissible through inhalation.


The death of a patient in the UK suffering from Lassa fever has heightened concern around the illness after a third case was reported.

The UK Health Security Agency (UKHSA) said it was contacting individuals who had been in close contact with the infected patients after the death was confirmed last week.

Continue reading “Lassa Fever: Symptoms Of Ebola-like Virus As First UK Death Confirmed” »

Page 1 of 9912345678Last