Menu

Blog

Page 8564

Jun 14, 2016

SECURITY — Promise and peril: opportunities and challenges of disruptive technologies and innovation

Posted by in categories: 3D printing, 4D printing, military, security

Forget 3D printing, are you ready for 4D printing?


The rapid development of a range of emerging technologies is driving four revolutions in military and security capabilities to which the global defence and security industry is increasingly required to respond.

Perception, processing and cognition

New approaches for both humans and machines to collect, synthesise, digest and discern information are necessary to make sense of complex and fast-moving strategic and operational contexts. Getting (and staying) ahead of threats and maintaining and leveraging situational awareness – especially in environments frequently marked simultaneously by a surfeit of available information of variable quality and timeliness and opacity – is beyond the capacity of legacy technologies and human capabilities.

Continue reading “SECURITY — Promise and peril: opportunities and challenges of disruptive technologies and innovation” »

Jun 14, 2016

Quantum 1, classical 0: Bell nonlocality universally confirmed in any large communication complexity advantage

Posted by in category: quantum physics

(Phys.org)—The relationship between communication complexity problems, Bell nonlocal correlations and the advantage of quantum over classical strategies has long been recognized, but has been confirmed in only two problems. Recently, however, scientists at University of Cambridge, University of Amsterdam, CWI, QuSoft, Gdansk University, Gdansk University of Technology, Adam Mickiewicz University, and Jagiellonian University employed a two-part method based on port-based teleportation – a scheme of quantum teleportation where a receiver has multiple (N) output ports and obtains the teleported state by merely selecting one of the N ports1,2. The researchers used the quantum protocol based on the given communication complexity game to construct a set of quantum measurements on a maximally entangled state to show that any large advantage over the best known classical strategy makes use of Bell nonlocal correlations. In so doing, the researchers assert, they have provided the missing link to the fundamental equivalence between Bell nonlocality and quantum advantage. Moreover, their results have significant implications for classical information processing and the development of more efficient teleportation protocols.

Dr. Sergii Strelchuk discussed the paper, “Quantum communication complexity advantage implies violation of a Bell inequality,” that he and his colleagues published in Proceedings of the National Academy of Sciences. Two of the challenges the scientists faced were encountered in demonstrating that any large advantage over the best known classical strategy makes use of Bell nonlocal correlations, and in providing the “missing link” (in the form of a general connection) between a large quantum advantage in communication complexity and Bell nonlocality. “One conceptual issue was finding a procedure that converts any quantum strategy for a given communication complexity problem into a set of correlations – that is, probability distributions corresponding to the measurement outcomes during the protocol,” Strelchuk tells Phys.org.

Read more

Jun 14, 2016

Five weirdest password alternatives of all time

Posted by in categories: business, computing, privacy

Computers can identify you based on your butt and your walk, not to mention your smell…

Around half of consumers would “choose anything but a traditional username and password account registration when given the option”, according to identity management firm Gigya.

But would they choose these truly bizarre password alternatives that have been proposed over the years, and would your business be safer switching to them? 1. Biometric Buttocks.

Continue reading “Five weirdest password alternatives of all time” »

Jun 14, 2016

These Experiments Are Building the Case to Terraform Mars

Posted by in categories: engineering, environmental, space

Maybe the researchers needs to meet with the professor out in University of WA who has been experimenting in shifting weather patterns such as making some areas have more rains while other areas not have as much rain.


If we want to live on Mars, we need to make it warm and wet again.

Read more

Jun 14, 2016

LIquidPiston Unveils Tiny But Powerful Rotary Engine

Posted by in category: transportation

Today it’s for go-carts; tomorrow, it may be an electric car range extender.

Read more

Jun 14, 2016

Brain computers are revolutionizing paralysis

Posted by in categories: biotech/medical, computing, neuroscience

BCI technologies are becoming powerful enough to change the way doctors think about paralysis and more.

Read more

Jun 14, 2016

DARPA chooses PARC and DZYNE to develop unmanned aircraft that vanish for precision air drops

Posted by in categories: military, robotics/AI

ARLINGTON, Va., 14 June 2016. U.S. military researchers have chosen two companies to develop small unpowered and unmanned aircraft to air-drop small packages for forward-deployed forces. After delivery, the unmanned aircraft will vanish without any detectable trace. Officials of the U.S. Defense …

Read more

Jun 14, 2016

Court Backs Rules Treating Internet as Utility, Not Luxury

Posted by in category: internet

Hmmm; wonder what the fallout will be as a result of this if other appellate courts, etc. rule the same.


An appeals court panel affirmed the Federal Communications Commission’s rules about net neutrality, clearing the way for stricter oversight of broadband providers.

Read more

Jun 14, 2016

Quantum technologies offer promise for data protection

Posted by in categories: privacy, quantum physics

1st, this article is full of inaccuracies such as 15 years away reported by NIST. Well, maybe 2 years ago they said this; however, in Jan. they and the NSA both stated that QC was less than 10 years away and a huge threat given the advancements by China. Also, this author writes that a hybrid system will be fine to withstand an attack by a hacker on QC. And, that s incorrect.

Also, if this article looks like another article published over a week ago by someone on Forbes; well it is because the author looks like copied word-for-word from the article in Forbes.

Read more

Jun 14, 2016

Quantum Computation: A cryptography armageddon?

Posted by in categories: computing, encryption, quantum physics

Glad that folks have awaken to the fact that QC is indeed coming and best to learn about this technology and make it part of the IT’s Future State.

http://www.welivesecurity.com/2016/06/14/quantum-computation

Cryptography-armageddon/

Continue reading “Quantum Computation: A cryptography armageddon?” »