Menu

Blog

Archive for the ‘security’ category: Page 84

Jan 9, 2019

Will humanity survive this century? Sir Martin Rees predicts ‘a bumpy ride’ ahead

Posted by in categories: biotech/medical, governance, security

Humanity is under threat. At least according to Sir Martin Rees, one of Britain’s most esteemed astronomers.


These two kinds of technologies enable just a few people to have a hugely wide-ranging and maybe even global cascading effect. This leads to big problems of governance because you’d like to regulate the use of these things, but enforcing regulations worldwide is very, very difficult. Think how hopeless it is to enforce the drug laws globally or the tax laws globally. To actually ensure that no one misuses these new technologies is just as difficult. I worry that we are going to have to minimize this risk by actions which lead to a great tension between privacy, liberty and security.

Do you see ways that we can use and develop these technologies in a responsible way?

Continue reading “Will humanity survive this century? Sir Martin Rees predicts ‘a bumpy ride’ ahead” »

Jan 8, 2019

Generating Actionable Understanding of Real-World Phenomena with AI

Posted by in categories: robotics/AI, security

Rapid comprehension of world events is critical to informing national security efforts. These noteworthy changes in the natural world or human society can create significant impact on their own, or may form part of a causal chain that produces broader impact. Many events are not simple occurrences but complex phenomena composed of a web of numerous subsidiary elements – from actors to timelines. The growing volume of unstructured, multimedia information available, however, hampers uncovering and understanding these events and their underlying elements.

“The process of uncovering relevant connections across mountains of information and the static elements that they underlie requires temporal information and event patterns, which can be difficult to capture at scale with currently available tools and systems,” said Dr. Boyan Onyshkevych, a program manager in DARPA’s Information Innovation Office (I2O).

The use of schemas to help draw correlations across information isn’t a new concept. First defined by cognitive scientist Jean Piaget in 1923, schemas are units of knowledge that humans reference to make sense of events by organizing them into commonly occurring narrative structures. For example, a trip to the grocery store typically involves a purchase transaction schema, which is defined by a set of actions (payment), roles (buyer, seller), and temporal constraints (items are scanned and then payment is exchanged).

Read more

Jan 8, 2019

Facility for Rare Isotope Beams

Posted by in categories: biotech/medical, education, employment, security

FRIB) will be a scientific user facility for the Office of Nuclear Physics in the U.S. Department of Energy Office of Science (DOE-SC). FRIB is funded by the DOE-SC, MSU and the State of Michigan. Supporting the mission of the Office of Nuclear Physics in DOE-SC, FRIB will enable scientists to make discoveries about the properties of rare isotopes (that is, short-lived nuclei not normally found on Earth), nuclear astrophysics, fundamental interactions, and applications for society, including in medicine, homeland security, and industry.

This video — The Facility for Rare Isotope Beams at MSU — explains the history of FRIB, its role in research and education, and its future in rare-isotope discoveries. It includes an animated sequence to help viewers understand what FRIB is about.

Employment opportunities: FRIB is looking for engineers, physicists, and other talented professionals to build the world’s leading rare isotope facility.

Read more

Dec 31, 2018

T cell photos make data encryption truly random

Posted by in categories: encryption, security

Uncrackable encryption keys made from images of 2,000 wiggling T cells could keep your data safe from hackers and security breaches.

Read more

Dec 29, 2018

Our Cellphones Aren’t Safe

Posted by in category: security

The international mobile communications system is built on top of several layers of technology, parts of which are more than 40 years old. Some of these old technologies are insecure, others have never had a proper audit and many simply haven’t received the attention needed to secure them properly. The protocols that form the underpinnings of the mobile system weren’t built with security in mind.


Security flaws threaten our privacy and bank accounts. So why aren’t we fixing them?

Read more

Dec 28, 2018

Start Preparing Now for the Post-Quantum Future

Posted by in categories: economics, encryption, quantum physics, robotics/AI, security

Quantum computing will break most of the encryption schemes on which we rely today. These five tips will help you get ready.

Search on the phrase “quantum computing,” and you’ll find a furious debate. On the one hand, you’ll read breathless articles predicting groundbreaking advances in artificial intelligence, genomics, economics, and pretty much every field under the sun. On the other, you’ll find the naysayers: It’s all hype. Large-scale quantum computers are still decades away — if they’re possible at all. Even if they arrive, they won’t be much faster than standard computers except for a tiny subset of problems.

There’s one area, however, where you’ll find all sides agree: Quantum computing will break most of the encryption schemes on which we rely today. If you’re responsible for your organization’s IT or security systems, and that sentence made the hair on the back of your neck stand up, good. To get ready for a post-quantum world, you should be thinking about the problem now.

Continue reading “Start Preparing Now for the Post-Quantum Future” »

Dec 25, 2018

US SpaceX First National Security Mission

Posted by in categories: security, space travel

SpaceX continues making news in 2018. The company first broke its own record from 2017 when it passed 18 launches in year. On Sunday, from Cape Canaveral, Florida, SpaceX launched another record-setting rocket… this one for U.S. national security. Arash Arabasadi reports.

Read more

Dec 25, 2018

Early-warning tools aim to prevent ‘water wars,’ curb droughts

Posted by in category: security

Water scarcity is a global security risk. Researchers are developing ways to forecast risks to prevent conflicts.

A plant grows between cracked mud at the Theewaterskloof dam near Cape Town, South Africa, on Jan. 21, 2018. The dam, which supplies most of Cape Town’s potable water, is currently dangerously low as the city faces “Day Zero”, the point at which taps will be shut down across the city. Mike Hutchings / Reuters file.

Read more

Dec 23, 2018

WATCH LIVE: SpaceX to Launch Falcon 9 Rocket #GPS III-1 #2018Finale @8:51am EST

Posted by in categories: satellites, security

For its 2018 finale, A SpaceX Falcon 9 rocket will launch the U.S. Air Force’s first third-generation navigation satellite for the Global Positioning System (GPS 3–01) from Cape Canaveral Air Force Station in Florida.

Liftoff window begins at 8:51 a.m. EST (1351 GMT).

Continue reading “WATCH LIVE: SpaceX to Launch Falcon 9 Rocket #GPS III-1 #2018Finale @8:51am EST” »

Dec 17, 2018

Mathematicians Seal Back Door to Breaking RSA Encryption

Posted by in categories: encryption, mathematics, security

Digital security depends on the difficulty of factoring large numbers. A new proof shows why one method for breaking digital encryption won’t work.

Read more

Page 84 of 131First8182838485868788Last