Saturday, 26 September 2015

Harry Potter-Style Invisibility Cloaks Exists in Real Life

Harry_Potter

Invisibility Cloak – Material of Gold Nanoantenna


An invisible cloak has been developed by scientists, a type of material which tends to wrap around objects, making them invisible to the naked eye. But the material is presently just enough to wrap around a very small item, much smaller than Dobby the house elf. However it is a huge innovation which portrays that we can in the near future have human sized invisibility cloaks.

 The microscopically thin film has been created by US researchers from the material of gold nanoantenna which is utilised in collecting the sun’s rays in solar panels. The film tends to confuse the human eye by sprinkling light waves which would generally hit an object making it invisible. Presently it has managed to hide something the size of a few cells.

Dr Xiang Zhang, corresponding author of US Department of Energy – DOE’s Lawrence Berkeley National Laboratory (Berkeley Lab) Materials Science Division, stated that it is the first time a 3D object of arbitrary shape has been cloaked from visible light.

The ultra-thin cloak seems like a coat and is easy to design as well as to implement. It is possibly accessible for the purpose of hiding macroscopic objects’.

Meta Engineered – Deflect Reflected Light Waves


The scattering of the light, whether it is visible, infrared of X-ray, from its interaction with matter is what enables us to detect and observe object. What governs these reactions in natural materials is evaded in metamaterials where optical properties tend to rise from their physical structure instead of their chemical composition.

Though the cloak is microscopic in size, the values behind the technology could enable it to be reached up to cover macroscopic objects too, according to researchers. Working on blocks of gold nanoantennas, a skin cloak has been created by the researches which is barely 80 nanometres in thickness that can wrap around a three dimensional object, the size of a few biological cells and randomly shaped with dents and bumps.

The surface of the skin of the clock is said to be Meta engineered to deflect the reflected light waves in order that the object is rendered invisible to optical recognition when the cloak tend to be activated.

Antenna Designed to React with Light/Scatter it Back


For the past ten years, Zhang together with his research group had been going beyond the precincts of how light tends to interact with metamaterials, handling to curve the path of light or bend it backwards, phenomena which is not envisaged in natural materials and to render object optically invisible.

Most of the cloaking devices in progress tend to work by channelling the light which normally would hit an object away from it. The new cloak on the contrary changes the way the light scatters, and creates an illusion of a surface as flat as a mirror rather than of the actual shape of the object.

 It has accomplished this by utilising a thin layer of material known as metasurface which is made of magnesium fluoride that is covered in millions of tiny golden antennae, each of which is about 1/1000th, the width of a human hair. Zhang had informed The Post that each antenna has been designed to react with the light and scatter it back and delay the light, delay the reflection in a way that every point of the face would reflect as if from a flat surface like a mirror.

He admits that there seems to be a lot of work to be done prior to the invisibility cloak of this type could be made useful.

Drones Operated by Criminal Gangs Used to Deliver Drugs Mobile Phones and Potentially Firearms to Prisoners

Jail_Model

Operating Drones – Threat to Security


According to officials, crime gangs are posing as increasing threat to security in Britain’s prison by operating drones and providing new options of smuggling drugs and other probably firearms in the hands of criminals.Commercial small drones are being utilised to pick up packages comprising of illicit items from mobile phone to synthetic drugs in jails which tends to threaten the security by making the intoxicants available that could aggravate and cause disorder in prison cells.

The intelligence officers at the National Offender Management Services – NOMS have shown that they are also disturbed at the prospect of using remote-controlled Unmanned Aerial Vehicles – UAVs to drop lethal weapons in jails after a package of the same size and weight of a gun had been dropped successfully unobserved in an unnamed totally secured prison at the time of covert testing earlier this year.

On investigation it was recommended that many incidents with the help of drones to overfly prisons, delivering packages in the last few months had been linked to serious crime groups. The outcome of it has governors now gearing themselves for security breaches by UAVs in being more recurrent issues over 150 prisons in Britain.

Drones – Cheap & Easy to Use


According to NOMS, the number of attempts to intrude the prisons with the use of four or six drones is generally available through online or high street retailer though small,l is on the rise. Within a span of five months to May this year, nine incidents have been identified in England and Wales when compared to four for the total of 2014.

 Analysts from NOMS gave a briefing at the Defence and Security Equipment International show in London describing drone use as an emerging threat causing a UAV technology, as cheap and easy to use. A senior analyst at the NOMS unit, Eve Richard stated that `in a nutshell, the intelligence recommend that the use of UAVs to release items into the prisons is an emerging threat and it is not a huge issue presently but there could be potential for the same to increase and become more problematic’.

He added that all the prisons could be vulnerable and it does not seem to matter where they could be but it does matter what kind of prisoners they tend to have and in what type of security category they may be.

Three Month Study of UAV Risks


Every space could be vulnerable since it is air space and as long as one can get a UAV over the wall they could be vulnerable. A UAV which is refined and capable of being accurately manoeuvred with the use of GPS technology and move a payload of over 1.5 kg could be bought for less than £1,000 and flown away with the minimum training.

A recent attempt where drones had been used to breach security had been made in March to fly a UAV into Bedford Prison along with a package comprising of mobile phones and drugs. However the aircraft got entangled in barbed wire after it seemed to have been destabilised by its cargo. NOMS has stated that as a part of a three month study of UAV risks, it had carried out a test flight of a drone over maximum security prison.

The drone achieved to fly over the prison and drop packages which were the same size and weight to a handgun prior to withdrawing unobserved by any one on duty. Mr Richard had commented that they had no intelligence that drones were being utilised for trafficking weapons but can now recognise that the possibility is there’.

How To Organize Your Files In A Convenient And Productive Fashion


clipix
Whether you are working on behalf of a major international corporation or starting out as a first time business owner, one thing is clear; If your work is primarily computer based, you will need to know how to organize your files in a convenient and productive fashion. The old adage that "Cleanliness is next to Godliness" can be updated for your purposes to read, "Cleanly organized files are tops for productivity and profits." But how can you quickly get organized so as to attain to such an exalted level among your peers?

Organize Your Relevant Files Like A True Professional

The answer is a simple one: You have got to figure out a way to organize your files so as to zip straight through all of your relevant information and turn that disorganized mess into a profit making whirlwind. How do you go about it? The first thing you need to do is sort through all of your incoming information and organize it into bite sized categories. For example, if you are collecting baseball stats for a company survey on fantasy sports leagues, you will need to organize all of the information into categories such as "At Bats", "Runs Batted In", "Walks", "Strike Outs", "File Photos", and so on.

Put All Of Your Incoming Information Into The Relevant Folders

As soon as you save some new piece of important information, it's an excellent idea to categorize it as shown above, and then place each bit into a relevant folder created specially for the purpose of receiving it. In other words, following the example listed previously, you should have folders marked "At Bats", "Walks", and so on ready to receive each new file that pertains to the matter at hand. This is the best way to insure that you will always know exactly where to find all of the bits of info that you need to insert into the appropriate place in your project.

You'll Need To Make Use Of An File Organizing System

Finally, you will need to make use of an online file organizing system that can keep all of your info in a safe, tidy location. For more information on how to make use of one of the hottest and most eagerly recommended new file organizing systems, please feel free to log on to https://www.clipix.com/ for more information.

Thursday, 24 September 2015

Google Car: User Interface For Displaying Internal State Of Autonomous Driving System


Google_Car
Google has long been creating news with its driverless car both for good and bad reasons. It has even registered the car and a company under its parent company to ensure a fine streamlined approach for making cars. Its testing with driverless cars has engaged with some unwanted accidents on minor scale, which is helping, in perfecting the vehicle.

The driverless automobile is still far from becoming a reality and it won’t be happening within next few years. Though currently it is in news for the new patent application, which shows that tech giant will be bringing some manual control options in its driverless car.

New manual controls to offer better driving experience


Google team of techs has termed the new addition of the manual controls as ‘arm the chauffer’ in the literal sense. This new feature helps in adding an arm on the steering column, which results in activating the automatic driving mode, and it works vice versa by restoring the manual control.

The transition from automatic to manual and manual to automatic is quite quick and it is almost similar to switching on and off the high beams. There is heightened support, which is quite intuitive in nature if a driver touches the pedal, or steering wheel either suddenly or with force then manual controls are activated by default. In simple words driver will be able to get the controls back in case he or she wishes to make any abrupt changes in the driving by taking some new roads or stopping by at some point.

How beneficial will be this new feature? 

This patented feature will allow a driver to take control of the vehicle back from the autopilot within a matter of few seconds. This feature allows a sublime and quick change between the driverless driving mode and manual drive mode, which is quite similar to the flight’s auto pilot mode.

With autopilot mode activated, one can sit back, relax and catch the wondrous scenes fleeting across the roads during long road trips. The driverless car and driver will work in close relation with the GPS and inbuilt driving assistant for using the driverless car.

This feature will enhance safety levels


The driverless cars being tested by many car manufacturers and Google has shown that it possess better safety records when coupled with humans behind the wheel but on its own it doesn’t that kind of record. This feature addition in Google’s driverless car will help in enhancing the levels of security to a greater extent. Google’s upcoming driverless technology will certainly be boosted by human control and with their experience and judgment in driving.

Does this feature show Google backing away from earlier stance? 

Google has for long taken a stance of developing a completely free from human intervention automatic driving technology which didn’t go well with many people. It should be also noted that laws also forbid to handle controls completely to robots or technology and it might be the reason that Google is now thinking about bringing manual controls in the driverless vehicle.

How it takes just 15 minutes of web tuition for anyone to hack into your email

Smartphone

Email Account Hacking – Easier & Faster


According to latest study, email account hacking is easier and faster than expected and takes less than 15 minutes. A group of volunteers comprising of TV producer, a retiree, a self-employed baker managed to learn the technique of hacking into someone’s account within a span of about 15 minutes.

 The group with limited knowledge of technology followed online tutorial utilising a man in the middle concept to hack into a computer network to gain each other’s login information. The controlled classroom trial led by Life assistance company CPP Group Plc involved helpers with a 14 minute lesson made available freely online.

Through this they were capable of downloading hacking software which enabled them to gain access in login details as well as passwords for email accounts, online shopping accounts and social networking sites within a few minutes.

There seems to be more than 20,000 videos online, coaching users on how to hack social media profiles, email, PayPal accounts and smartphones and the internet’s potentials in hosting hacking tutorials seems to be unchallenged. It has been observed that over seven million people have been the victims of their online password protected information accessed without their permission

Government to Take a Stronger Stand on Online Hacking Tutorials


Many users have had their personal emails hacked with around 19% stating that their eBay accounts have also been hacked.Accounts of social media users were also not spared from being hacked too, with 16% informing that their social networking profiles had been tampered into and around 10% have had their money or a loan taken on their behalf. With the increase in several public Wi-Fi networks as well as smartphone with inbuilt Wi-Fi connections in the last few years have given rise to opportunities for hackers with this type of crime the capabilities which would tend to increase in due course of time.

Most of the people are aware that the online hacking tutorials prevail with several others agreeing that this type of coaching need not be made available to online users, which would be creating a lot of inconvenience to the victim and beneficial to the culprit.

More than half of the people desire that the governments should take timely action in eliminating these hacking tutorials from the internet. The CPP has been advising people to take necessary action in protecting themselves from these online hackers wherever possible and are also influencing the government to take a stronger stand on, online hacking tutorials.

Bring Awareness on Risks Involved


Michael Lynch, the firm’s identity fraud expert had commented that `the recent Sony security break which had seen a hacker gaining access to the personal data of over 100 million online gamers, that included the people in Britain, has portrayed the increase and widespread danger, hackers tend to pose to consumers as well as businesses.

It is essential to bring about awareness on the risks involved so that adequate steps in the protection of their identities and safeguard their personal data from the hands of these hackers. The technique shown in the live session indicate that these hacking skills could be applied within a few minutes and hence it is critical for consumers to take timely action and protect their data from these hackers.

They use the man in the middle hacking technique which works by the hacker interrupting communication between two users or what an individual is viewing on the internet and as the user logs into their online account, their username as well as password appears also on the hackers’ desktop enabling him to store the information and access the account immediately on some time later.