Menu

Blog

Page 11411

Feb 18, 2016

Obama wants to spend $19 billion on cyber security

Posted by in categories: business, cybercrime/malcode, employment, health, quantum physics

One thing that will remain with tech for many years is jobs in cyber security — even with the layer of security that Quantum technology brings in the next 10 years; there is always a migration and retirement state that can (depending on the business and systems involved) could go on for years after Quantum platforms and networks are installed.


Then in December, aided and abetted by a Republican-controlled Congress, he eradicated those minor restrictions and replaced mindless austerity with clueless profligacy.

It proposes lifting the limits entirely from 2018. “It adheres to last year’s bipartisan budget agreement, it drives down the deficit, and includes smart savigs on health care, immigration and tax reform”.

Continue reading “Obama wants to spend $19 billion on cyber security” »

Feb 18, 2016

Stretchable nano-devices towards smart contact lenses

Posted by in category: nanotechnology

One of my favorites for 2016 — smart contact lenses.


Researchers at RMIT University and the University of Adelaide have joined forces to create a stretchable nano-scale device to manipulate light.

RMIT University.

Read more

Feb 18, 2016

ISRO is developing a nano satellite to monitor suspended particles in polluted Indian cities

Posted by in categories: particle physics, quantum physics, satellites

Nano Satellite could be interesting and even expanded upon especially as we look to expand the usage of Quantum Technology across various wireless devices in the future as well as microbot technology to enable connectivity to the cloud and other wireless devices.


The nano-satellite, which is among ISRO’s important missions, will monitor air pollutants that pollute cities including Delhi, Lucknow, Amritsar and Allahabad.

The nano-satellite will weigh 15kg and placed 500 km above the earth.

Continue reading “ISRO is developing a nano satellite to monitor suspended particles in polluted Indian cities” »

Feb 18, 2016

New Wireless Neural Implant Transmits Brain Signals to Prosthetic Limbs

Posted by in categories: biotech/medical, computing, cyborgs, neuroscience

A new chip designed for the brain is now wireless. Now that it is no longer connected using wires, will it compromise its accuracy?

The Nanyang Technological University in Singapore has developed a smart chip that can be used for neural implants in order to wirelessly transmit brain signals to the rest of the body with 95% accuracy. These neural implants, and the data that they register, are expected to help curtail symptoms of diseases like Parkinson’s, and they could also help paraplegic patients move their prosthetic limbs.

For operations, external devices can use the the 5mm by 5mm chip to receive and analyze data before sending back important details, instead of sending the entire data stream all at once. This drastically decreases its power consumption, making the tech far more viable.

Read more

Feb 18, 2016

A five-dimensional black hole could break the theory of relativity

Posted by in categories: computing, cosmology, physics

The 5 Dimensional Black Hole could break the theory of relativity: Simulation suggests strange rings with ‘ultragravity’ that defy physics may exist.

Follow us: @MailOnline on Twitter | DailyMail on Facebook.


Researchers from the University of Cambridge and Queen Mary University of London made the discovery after simulating a black hole shaped like a very thin ring using computer models.

Read more

Feb 18, 2016

Cyber Threat Information Sharing Guidelines Released

Posted by in categories: cybercrime/malcode, law

Finally; it’s a start at least.


This week, the Federal government took the first steps toward implementation of the The Cybersecurity Information Sharing Act (CISA), enacted into law last December. CISA aims to encourage sharing of cyber threat indicators and defensive measures among private companies and between the private sector and the Federal government by providing liability protection for sharing such information in accordance with the Act. The DHS Federal Register notice was published this morning here.

As required by the Act, the government has released four pieces of guidance designed to assist companies and Federal agencies with respect to sharing, receiving and handling cyber threat information.

Read more

Feb 18, 2016

Cryptowall has been a cash bonanza for criminals, failure for cops

Posted by in category: cybercrime/malcode

Though dubbed the most successful malware in history Cryptowall can be stopped.

Read more

Feb 18, 2016

A Blueprint to Build Conscious Machines

Posted by in categories: neuroscience, robotics/AI

https://youtube.com/watch?v=KV3hHGUGXIU

A complete cognitive architecture to implement systems that are self-aware and capable of intentional mutations. Now available at mecasapiens.com.

HALIFAX, CANADA, February 16, 2016 (Newswire.com) — Monterège Design Inc. is pleased to announce the publication of a cognitive architecture to implement synthetic consciousness. The systems based on this architecture will be fully autonomous, self-aware and capable of intentional mutations. The architecture, published under the title The Meca Sapiens Blueprint, is complete and ready for design and implementation. It can be purchased on line at mecasapiens.com.

Read more

Feb 18, 2016

Scientists Have Created Miniature Versions of the Human Brain Using Skin Cells

Posted by in categories: biotech/medical, neuroscience

Researchers have developed a functioning miniature replica of the human brain, composed of neurons and glial cells, to help study and better understand neurological diseases.

A tiny ball of brain cells may help researchers alleviate or treat neurological diseases.

These small cellular balls act like miniature versions of the human brain, mimicking various aspects of the actual brain that include sending pulses of electric signals akin to what happens in a thinking mind. This research was reported at the annual meeting of the American Association for the Advancement of Science in Washington.

Read more

Feb 18, 2016

What is ransomware and how to protect your business from it

Posted by in categories: business, cybercrime/malcode

What would it mean if you lost all of your personal documents, such as your family photos, research or business records? How much would you pay to get them back? There’s a burgeoning form of cybercrime that hinges on the answers to these questions.

You have probably heard of viruses and malware. These dangerous pieces of software can make their way into your computer and wreak havoc. Malware authors are intent on stealing your data and disrupting the proper functioning of your digital devices.

Then there is ransomware. This is crafted by cyber-criminals for extorting data from innocent users, and is rapidly becoming a threat to individuals, small business and corporate users alike.

Read more