Menu

Blog

Archive for the ‘security’ category: Page 83

Oct 30, 2016

HoloLens gets more battlefield use

Posted by in categories: augmented reality, military, security

We have already seen the HoloLens mixed reality headset put to military use by the Israeli Defense Force for advanced battlefield planning.

Now Ukrainian company LimpidArmor has shown off a new application for the augmented reality device on the actual battlefield to improve the field of view of tank commanders without exposing them to additional risk. The technology was shown off at the Arms and Security show, held in Kiev from 11 to 14 October.

LimpidArmor’s hardware and software system uses a HoloLens integrated with a helmet and cameras mounted around the tank to give commanders a 360 degree view of their environment in both optical and thermal and makes this available in real-time.

Continue reading “HoloLens gets more battlefield use” »

Oct 25, 2016

The exciting new age of quantum computing

Posted by in categories: biotech/medical, computing, encryption, military, quantum physics, security, space travel

What does the future hold for computing? Experts at the Networked Quantum Information Technologies Hub (NQIT), based at Oxford University, believe our next great technological leap lies in the development of quantum computing.

Quantum computers could solve problems it takes a conventional computer longer than the lifetime of the universe to solve. This could bring new possibilities, such as advanced drug development, superior military intelligence, greater opportunities for and enhanced encryption security.

Continue reading “The exciting new age of quantum computing” »

Oct 24, 2016

AI-powered security cameras recognize small details faster

Posted by in categories: robotics/AI, security

On-board processing will give every digital eye a very powerful brain.

Read more

Oct 24, 2016

Meet the Fully Programmable Linux Computer That’s Smaller Than a Coin

Posted by in categories: computing, media & arts, security

Microcomputers are great for learning about code and hardware. The VoCore2 Mini is the smallest ever, packing full Linux functionality and wireless connectivity into a coin-sized device. New Atlas Deals has it for just $42.99.

This impressive little computer is capable of running programs in C, Java, Ruby, JavaScript, and many other languages. This means you can code the VoCore2 to expand its functionality, turning it into a VPN gateway, airplay music station, and much more.

You can also augment the VoCore2 with hardware components for further tinkering fun. Add a USB webcam to turn it into a home security camera, attach a microphone to issue voice commands to Siri or Echo, and so on. Your projects are limited only by your imagination.

Read more

Oct 16, 2016

Saudi Commentator Praises Israel; Latest Sign of Warming Ties Between Jewish and Arab States

Posted by in categories: economics, security, sustainability

Could technology build friendships for Israel across the Middle East?


Israel and Saudi Arabia should form a “collaborative alliance” to become the “twin pillars of regional stability” in the Middle East, a top Saudi lobbyist wrote in The Hill on Tuesday, in what is the latest sign of warming and increasingly-public ties between Arab countries and the Jewish state.

Salman al-Ansari, the founder and president of the Saudi American Public Relations Affairs Committee, asserted that Israel can assist Saudi Arabia in implementing its Vision 2030, the Kingdom’s blueprint to diversify its economy. Al-Ansari specifically mentioned Israel’s expertise in mining and water technology, which makes Israel “extraordinarily qualified to help Saudi Arabia with its ambitious desalination plans.”

Continue reading “Saudi Commentator Praises Israel; Latest Sign of Warming Ties Between Jewish and Arab States” »

Oct 6, 2016

The quantum clock is ticking on encryption – and your data is under threat

Posted by in categories: computing, encryption, quantum physics, security

Quantum computers pose a major threat to the security of our data. So what can be done to keep it safe?

Read more

Oct 6, 2016

Panasonic uses human touch to transfer data

Posted by in categories: business, information science, security

In an age when digital information can fly around the connected networks of the world in the blink of an eye, it may seem a little old timey to consider delivering messages by hand. But that’s precisely what Panasonic is doing at CEATEC this week. The company is demonstrating a prototype communication system where data is transmitted from one person to another through touch.

There’s very little information on the system available, but Panasonic says that the prototype uses electric field communication technology to move data from “thing-to-thing, human-to-human and human-to-thing.” Data transfer and authentication occurs when the objects or people touch, with digital information stored in a source tag instantaneously moving to a receiver module – kind of like NFC tap to connect technology, but with people in the equation as well as devices.

Continue reading “Panasonic uses human touch to transfer data” »

Oct 5, 2016

Now You Can Use Your Head (and the Rest of Your Body) to Securely Transfer Data

Posted by in categories: computing, privacy, security

In Brief.

  • Data can be sent at rates of 50 bps on laptop touchpads and 25 bps with fingerprint sensors using on-body transmission.
  • New developments in biometrics are allowing for even greater privacy and security in our networked society.

Read more

Oct 5, 2016

Modernize Your Data Center’s DNA

Posted by in category: security

As security threats are more sophisticated today than in the past, modern data centers are becoming increasingly vulnerable. Micro-segmentation is your answer to protect your data center against these sophisticated threats. Read this trend brief to see how it builds security into the DNA of the data center for a cost-effective, future-proof way to protect what matters.

Read more

Oct 2, 2016

Science, Technology, and the Future of Warfare

Posted by in categories: 3D printing, biotech/medical, computing, economics, existential risks, governance, military, nanotechnology, policy, robotics/AI, science, security

Nice POV read.


We know that emerging innovations within cutting-edge science and technology (S&T) areas carry the potential to revolutionize governmental structures, economies, and life as we know it. Yet, others have argued that such technologies could yield doomsday scenarios and that military applications of such technologies have even greater potential than nuclear weapons to radically change the balance of power. These S&T areas include robotics and autonomous unmanned system; artificial intelligence; biotechnology, including synthetic and systems biology; the cognitive neurosciences; nanotechnology, including stealth meta-materials; additive manufacturing (aka 3D printing); and the intersection of each with information and computing technologies, i.e., cyber-everything. These concepts and the underlying strategic importance were articulated at the multi-national level in NATO’s May 2010 New Strategic Concept paper: “Less predictable is the possibility that research breakthroughs will transform the technological battlefield … The most destructive periods of history tend to be those when the means of aggression have gained the upper hand in the art of waging war.”

As new and unpredicted technologies are emerging at a seemingly unprecedented pace globally, communication of those new discoveries is occurring faster than ever, meaning that the unique ownership of a new technology is no longer a sufficient position, if not impossible. They’re becoming cheaper and more readily available. In today’s world, recognition of the potential applications of a technology and a sense of purpose in exploiting it are far more important than simply having access to it.

Continue reading “Science, Technology, and the Future of Warfare” »

Page 83 of 114First8081828384858687Last