Monday 19 October 2015

Watch a Floating Green Ball of Water Effervesce in Space in Glorious 4K

Green_Ball_of_Water

NASA Astronauts aboard ISS Assessing 4 K Cameras


The astronauts of NASA, aboard the International Space Station- ISS, have been presently assessing a 4K camera for filming science experiments which means that the recording would be at higher frame rate, higher resolution than the usual HD camera and would be offering more information to researcher studying the recordings. Moreover, it would also add more fun together with interesting videos.

Most recent is the video starring astronaut Scott Kelly and the ball of changing colours is unique because of the first space videos which NASA shot in 4K ultra-high definitions HD. Kelly who is part of NASA’s crew, had spent a year in space instead of the standard six months, in order to scale the effects on the body of long term Mars mission, toying with water.

 Subsequent to the 8K UHD, 4K UHD is said to provide the highest resolution viewing experience one can get and is four times the definition which the standard 1080p HD television could offer. NASA has explained in a description of the video that astronaut Scott Kelly had taken on board the ISS, that the higher resolution images and higher frame rate videos seems to disclose more information when utilised on science investigations providing the researchers with valuable new tool aboard the space station.

Video Beautiful Highlighting Various Colours/Texture/Movements


His video is just not beautiful but tends to highlight various colours, textures as well as movements which show the high resolution camera’s tremendous potentials. Kelly has a globule of water in which is added things and is filming the effects.

Water floats in the air as quivering blobs, in microgravity, which tends to make for some experiments which the astronauts finds it fun, like the popping water balloons, or injecting air bubbles and watching how the water tends to move.

In July, Terry Virts, NASA astronaut had inserted an effervescent tablet in a ball of water to observe it dissolve and release gases in the water and in the air. In Kelly’s experiment, he tends to switch it a little wherein he creates the water globule first and then adds what seems like blue and yellow edible dye to colour the water into an algae green.

Camera – Huge Sensors/Potential of High Resolution Imaging


Thereafter he adds effervescent tablets that cause the green globule to bubble and distort as tablet tends to quickly break down producing carbon dioxide. One can observe individual pockets of water explode off the surface after the effervescent tablet has dissolved which is because as the tablet liquefies it generates bubbles of carbon dioxide gas in the water which would generally rise to the surface of a glass on Earth.

However in space it moves to the outer edge of the sphere increasing in size till the bubbles pop flinging bits of water everywhere.The camera – the Red Epic Dragon 4K has also been utilised in the production of films like Peter Jackson’s – the Hobbit, series. Rodney Grubbs, program manager for NASA’s Imagery Experts Program of the camera in July, informs that this is a big leap in camera technology for spaceflight.

These cameras tend to have huge sensors with the potential of very high resolution imaging at high frame rates. It seems like having a high speed 35MM motion picture film camera though it is compact and can use lenses which are already up there besides being digital.



How a 3 D Printer Changed a 4-Year Old's Heart and Life

3D printed heart

Mia’s Malformation Treated With 3-D Printer


Mia Gonzalez who had been suffering from malformation in her aorta, the vessel that pumps blood from the heart, had to spend the first three and a half years of her life missing on most of the activities in life. She had to miss out on day care as well as dance classes due to the condition of colds and pneumonia.

When she was unable to go out and play, she was easily breathless and had to take multiple asthma medication to aid in the breathing. After around 10 hospital stay she had been diagnosed of this ailment. This four year old was in need of an operation to block off the part of her aorta which was putting pressure on her windpipe, making it hard to breathe, swallow and get rid of phlegm whenever she got a cold.

Mia’s mother, Katherine Gonzalez informed that they got out, thinking that she had asthma only to be told that she needed to undergo open heart surgery. However, her malformations seemed to be complicating. The surgeons at Nicklaus Children’s Hospital in Miami, treating Mia would have been apprehensive regarding the process if it was not for the new technology, the 3-D printer

Printer Use Images From MRI/CT Scan Images as Templates


The hospital had obtained a 3-D printer, earlier in the year, which makes the exact models of organs which the doctors could use to plan surgery as well as practice operations. The printer then to use images from patients’ MRI or CT scan images as template and lays down layers of rubber or plastic.

The director of paediatric cardiovascular surgery at Nicklaus Children’s Hospital, Dr Redmond Burke, considered the model of Mia’s heart for couple of weeks and showed it to his colleagues for their contribution regarding the same. He even carried it in his gym bag for quick reference.

He finally had the right insight and instead of making an incision on the left side of this kind of heart defect, known as double aortic arch, he cut into Mia’s chest from the right. Burke informed that without the model he would have been less certain about Mia’s operation and that would have led him in making a larger incision which would cause more pain with longer recovery time. He added that using the model there was no room for doubt and surgeons dislike doubts.

Model Saved Team/Patient – 2 Hours in Operation Theatre


He points that the model saved the team as well as the patient about two hours in the operation theatre since he was capable of having a clearer plan in performing the surgery. Though 3-D printers had been clinically utilised for the last 20 or 25 years in making prototypes for surgical tools as well as other usages, it only began with simulated organs in the last few years, according to Rader.

 Surgeons had utilised the simulated organs for preparing all types of complicated surgeries like the surgery to remove a brain tumour or to correct a severe cleft palate, informs Rader. He further adds that, doctors could operate on them with regular surgical tools again and again till they found the optimal way of doing the surgery.

 For Mia, four months thereafter, her mother informed that the surgery seemed like ancient history to her and she had forgotten all about the surgical scar and had little pain. Though she had some minor colds, none had given her reason to be in the hospital and a month later she was also in a position to participate in her dance performance

Friday 16 October 2015

Light Introduces Multi-Aperture Computational Camera

L16

L16 Launch by Light – Interesting Camera to Test & Shoot


Light was established to make attractive photography more accessible than before and presently the first step towards this goal has been brought about, by the launch of the Light 16 Camera. This being the first product launch for Light and as start-up founder will tell that the experience is similar to that of a first born, a nerve wrecking experience.

 The latest version in camera, L16 is a small camera which permits professional quality photos. Lori Grunin who covers digital imaging for sources has revealed on Light. According to her, it seems to be one of the most interesting cameras to test and shoot.

 It is the first multi-aperture computational camera which takes quality images and is small as well as light to be carried around. The company has advertised that the camera delivers the highest quality from the smallest possible device. It is considered like having a camera body, zoom and three fast prime lenses inside your pocket. Dave Grannan, Light CEO had mentioned in MIT Technology Review that he does not think that on day one consumers would drop their DSLR to buy one of these, though they think that here is a huge population of users who would appreciate the size, cost as well as the weight reduction.

First Multi Aperture Computational Camera


Light, the company behind the L16, is the first multi aperture computational camera which has a technology using a blend of folded optics with computational imaging algorithms. Light has informed that `with 16 individual cameras, ten have been firing simultaneously; the L16 tends to capture details of the shot at multiple fixed focal lengths.

The images are computationally fused to create a final image with about 52 megapixel resolution. The term `folded optics’ has been explained by Rachel Metz in MIT Technology Review that each camera module is placed on its side and light tends to come in through an aperture, hitting a mirror and then travelling down the barrel of the lens to an image sensor.

Since the camera modules have different focal lengths, various ones will fire at once based on how close one would want to zoom in, on a subject and how the mirrors within the modules move to grab light’. The focus and depth of field can be adjusted even after the shot is taken.

The L16 would be having three different focal lengths, five 35 millimeter ones, five 70 millimeter ones and six 150 millimetre ones and each of the modules of the camera would have a 13 megapixel image sensor.

Comes with Wi-Fi Built-in


Pre-orders are being taken by the company which is $1299 till November 6. Thereafter it would be going up to $1699. The camera is said to be shipped by late summer of 2016.

The L16 is also said to be dust and water resistant. It has been mentioned by Rob Triggs in Android Authority about some other features regarding the L16 which tends to be appealing both to nonprofessional as well as professional photographers.

The L16 comes with Wi-Fi built-in where photographers could share their images straight from the camera or instantly transfer them over the air to a PC. As per MIT Technology Review, Light is said to be working on the L16 since 2013 and since then has had a deal with Foxconn in bringing the device to smartphones, which is expected somewhere next year.

Electronics that Better Mimic Natural Light Promise More Vivid, Healthy Illumination

Light

Devices for Lighting – Similar to Natural Light


Inspite of technological leaps in up-to-date electronics, the excellence of lighting which they provide still tends to leave much scope for improvement. A joint team led by an associate professor Jian Li, of material sciences and engineering in the Ira A. Fulton Schools of Engineering at Arizona State University, intends to change that.

According to Li, the team is expecting to produce devices for lighting which would be similar to natural light than the earlier technology, allowing user to view things in a healthier, brightly lighted atmosphere. One section of the research with possibility of solutions is aimed on creating advanced organic light emitting diodes known as OLEDs.

The updated OLEDS will not be emitting ultraviolet – UV which will not enable clearer vision but also help in preventing eyestrain which is often the outcome of constant exposure to the UV light that is emitted by the present devices according to Li.

These types of OLEDs would mainly be advantageous to museum, art galleries and other places since the UV lights hinders the human eye in discerning colour variations clearly as well as the texture of objects. Over a period of time, UV light also tends to dull colours of painting, causing gradual decomposition of the paints together with the other materials.

Provision of Grant of $875,000 – 2 Years


Li who is on the faculty of the School for Engineering of Matter, Transport and Energy has informed that the most important developments in the technology would extent to `a big milestone’ in the potential of effectively lighting our world. Operation on OLEDS headed by Li in the past decade had drawn continuous interest from government as well as industry and the most recent aid is a grant with provision of $875,000 over two years from the U.S.Department of Energy.

This would make provision for Li’s lab to enlarge its research with further development in collaboration with Universal Display Corporation, which is a leading developer of electronic display and lighting technologies on organic materials.

Li had informed that the Department of Energy contemplates the progress in OLEDs as a great priority which is the main part of its attempt in helping the world to become more energy efficient, expand into renewable energy resources as well as discover ways of offering more affordable energy.

More Control on Brightness of Lighting …


Next generation of OLED technology can be anticipated in improving the lighting presentation in the various solid state electronics from lighting for streets, parks, sports facilities to cell phones, digital watches, computer screen, television and flexible electronic displays together with home, industrial and commercial lighting.

The advanced OLEDs would permit more control on the brightness of lighting together with provision of more choices in moulding the shapes of the lighting devices, to determine the direction as well as the intensity of light and to regulate the colour of light.

Li’s research team have been working in the development of OLEDs which tend to utilise single emissive material in the creation of a white emission instead of the more difficult structures that depend on the utilisation of a mixture of blue, green and red emissive material which are designed to produce a working stable as well as pure white light than the other lighting technologies.

The Benefits of Outsourcing Your IT to Other Companies


outsourcing
The ability to outsource to other companies and freelancers is a great gift to small businesses, who can’t always keep everything in-house. Even large businesses like to do this, as it just makes financial sense. IT, in particular, is a great one to consider outsourcing – so what are the benefits of doing this? Let’s take a look…

Full Control of Costs

IT bills can explode out of control. With a monthly, reliable expenditure, you can take back control of your IT costs, and limit the money flying out of your bank account. Knowing how much you need to spend per month (or year) is another worry off your shoulders. You will probably need to keep some form of IT personnel around to fix minor problems, but this means that your IT representative is less stretched, and that you hopefully won’t have to hire an entire team to take care of the many IT concerns (especially if your company is very internet dependent).

Your Staff Can Focus On Other Things

Your employees are one of your greatest assets and resources, but they are also one of your most troubling expenditures. So that everyone can do their job without interference, ensuring that your workers are focused on delivering great service to customers and clients, outsourcing your IT is a fantastic way to let your employees do what they do best, without being spread too thin. It should also save time in trying to figure out the problem in-house – make it someone else’s issue!

You Won’t Have To Provide Extra IT Training

Training and improvements will all be down to the outsourced company? New software or legal changes? They will have to adjust their skills and educate their employees - nothing extra will come out of your pocket. You also don’t have to keep abreast of all of the new developments either, which will save your teams a lot of time in trying to stay cutting edge – someone else can make sure that the software is up-to-date and competitive.

Staying Competitive

Often – especially for small businesses – it just makes sense to outsource your work. You can’t keep absolutely everything in-house and remain competitive. However, if you DO outsource a few parts of your business, you are remaining agile and fighting fit. Yes, the bigger companies have more flout, but you are versatile, new, exciting, and you can roll with the punches.

Risk Reduction

If ever there is an issue, it doesn’t have to drastically impact your business’ productivity. An outsourced company will have the responsibility to rectify the problem. There are plenty of companies out there that offer a wide variety of packages for IT departments – Exponential E is one of the more obvious choices for this kind of service – but look for something that will get you the most service for your payments. In order to make outsourcing feasible, you should ideally entrust the majority of the responsibilities to a separate set of professionals.

Thursday 15 October 2015

These 7 Apps are among the Worst at Protecting Privacy

talking_tom

Free/Paid Apps Accompanied with Hidden Cost


While browsing through the various apps which are made available from Apple and Android app stores, one will observe that around 98% of them tend to be free for download. However, several of the various free apps together with the paid ones tend to be accompanied with hidden cost which is your privacy. When apps are installed on the gadget the user is prompted with permission to access certain information or phone features. At time they need this information and at other times it does not seem to be essential.

Messaging app for instance requires permission for accessing contacts and Wi-Fi connection to do its task. But a Flashlight app does not need to know the location or have total internet access. Often users tend to hit `accept’ to install apps without checking what they do.

Apple devices enables apps to approve or deny permission individually wherein one can go to Settings – Privacy and open a feature such as Camera to view and control which apps have permission to access it. Another option is to go to Settings and scroll towards the bottom and tap on a particular app to see and control its permission.

PrivacyGrade – Popular Android Apps


Carnegie Mellon University had a few years back, set up a site known as PrivacyGrade which analyses popular Android apps to check what permissions they ask and how they utilised the information with a grade from A to D for each of them. With the scoring system, the score of PrivacyGrade tends to change over a period of time. At times the app which used to be on the `D’ list would get a `B’ or even an `A’. That is because; at times the app pulled its permission though at other times it decided to be more open on what it tends to do with the information.

The following are the seven popular apps which PrivacyGrade a low score -

1. Draw Something Free – D

This app enables the user to play a version of remote Pictionary with their friends which is enjoyable. However, it comprises of several advertisers libraries and utilises the `Read phone status and identity status’ permission to allow advertisers your call log, phone number, signal information, carrier and much more.

2. Words with Friends - D

This well-known app is similar to a fast game of Scrabble and is good for brushing up on vocabulary. But it is from the same developer as `Draw Something’ and is not surprising that it has the same privacy, though it goes a little further with the `Precise location’ permission. Since it does not use the location for the game, it does tend to use it to indicate to you location based ads.

3. GO Locker – D

The app tends to act as a screen lock for the phone, promising to be more secure and smarter than the built-in screen lock on the device. It means that it needs to know a lot about the phone and needs all permission available right from location to reading the text messages. Though it does not have advertising libraries installed, it could send data to advertisers utilising its own first party codes. It does not link up to send information to app stores other than Google Play which could be dangerous since app stores besides Google have malicious app. These could get hold of information from your phone.

4. GO Weather Forecast & Widgets - D

This app from the same company which brought GO Locker, provides the weather and forecast, but like GO Locker, it tends to utilise plenty of its permission to direct data to app markets besides Google Play. After some bit of checking, it seems that each GO app inclusive of GO Battery as well as GO SMS Pro, seem to have the same design and should be avoided.

5. Camera360 Ultimate – D

The default camera app of Android is serviceable, but not fanciful. The Camera360 Ultimate has the potentials to add more camera modes, with filters, free cloud storage, real-time `touch-ups’ facial recognition and much more without ads.

6. Angry Birds - C

Angry Birds was the first modern `virus-related’ mobile game with over 2 billion downloads since 2009 and most of its sequels as well as by-products do not fare well with privacy. Several of them include targeted ad libraries which tend to grab the identify information of the phone including call logs, carrier, device ID and number, etc. Beyond the score of PrivacyGrade, Angry Birds also has the difference of being one of the apps which NSA and British GCHQ had targeted to get hold of user information from smartphones. The improved version of Angry Birds is not vulnerable and they have scored a higher `B’.

7. My Talking Tom - D

This app is a little game where one can adopt and take care of a kitten but its privacy settings are not so lovable. It comprises of an eight targeted ad libraries besides the phone’s identifying information which is sent to the advertisers audio from the microphone.

Can Making Seawater Drinkable Quench the World's Thirst?

desalination_plant

Seawater Desalination Plants For Filtered Water


Generating fresh drinking water from sea through desalination has always been the best option to the water shortage faced during the year. Oceans tend to cover over 70% of the surface of the earth which contains 97% of its water. However the efforts essential in the achievement of this simple procedure seems to be costly. But now with enhancement in technologies, the cost has been reduced to half with huge desalination plants coming up all around the globe.

The biggest seawater desalination plant ever has just ramped up to full production in Israel’s Sorek plant near Tel Aviv which will make about 624 million litres of filtered water daily, selling around 1,000 litres equal to weekly consumption of Brit for 45p. The Ras al-Khair plant in Saudi Arabia tends to reach full production in December.

Created in the peninsula’s Eastern Province, it would be much bigger, speeding a billion litres a day to Riyadh where the population seems to be on the rise. A connected power plant would be yielding 2.4 million watts of electricity. The desalination plant in the US, San Diego’s Carlsbad, which is the country’s largest, would be in operation from November.

Reverse Osmosis – Utilises Less Energy – New Lease of Life


The old style of extracting drinking water from sea or saline water was to boil it then collect the evaporated water as a pure distillate which tends to utilise lot of energy but works well when combined with industrial plants which can produce heat as a by-product.

The new desalination plant at Saudi Arabia tends to pair with a power plant for this purpose. But in recent years, reverse osmosis, a technology which has been since 1960s utilises less energy has been given a new lease of life. It involves pushing salt water at high pressure via a polymer membrane comprising of holes around a fifth of a nanometre in size.

A nanometre is said to be a billionth of a metre, and the holes which are small enough to block the salt molecule are big enough to enable the water molecule through. Profession Nidal Hilal at Swansea University, editor-in-chief of the journal explains that this membrane tends to strip all the salts and minerals totally from the water and get clean water coming down as infiltrate and the distillation on the other side is saline with high content of salt.

However, these membranes may get clogged easily and lose its performance but with improved technology and pre-treatment techniques, there is a possibility of keeping them working efficiently for a longer period. Sorek’s designers in Israel tend to save energy by utilising double sized pressure vessels.

Dr Jack Gilron, head of Desalination and Water Treatment at Ben Gurion comments that one would need less pressure vessels to generate water which means fewer pipes and less connection. The researchers at Massachusetts Institute of Technology – MIT in US had experimented with semi-permeable membranes which were made from atom thick graphene that need less pressure to function and thus saves energy even though the technology is not yet prepared for mass production.

With regards to forward osmosis, Professor Nick Hankins, chemical engineer at the University of Oxford is of the opinion that it is an alternative option of removing the salt from seawater. A highly concentrated solution is utilised to draw it through instead of pushing the fresh water through the membrane, which efficiently sucks it from the sea water. Thereafter the diluted solutes are removed producing pure water.

Wednesday 14 October 2015

Crippling Linux Botnet Strikes Gaming, Education Sites


Botnet
Botnet Plundering Linux Computers – Attack Powerful


The IT world has recently revealed that a botnet has been plundering the Linux computers and the attacks seem to be quite powerful. Several of the targets seem to be in Asia and the security experts are making efforts in tracking them and the botnet appears to be of Asian origin.

A network of Linux computers seems to be flooding gaming as well as education sites with about 150 gigabits per second of malicious traffic, according to Dan Goodin of Ars Technica, which in some cases is adequate to knock the targets offline.

This is a DDoS – distributed denial-of-service network and the discoveries are from Akamai Technologies. The Security Intelligence Response Team – SIRT, at Akamai reflected the botnet XOR DDoS as `High Risk’ in an advisory posted recently.

 It is said that the XOR DDoS botnet had developed and now has the potential of mega DDoS attacks at 150 plus Gbps and are utilising a Trojan malware in hijacking the Linus system. The first access was obtained by brute force attacks in order to discover the password to Secure Shell services on a Linux machine. When the Login has been attained, the attackers used root privileges in order to run a Bash shell script, thereby downloading and executing the nasty binary

SIRT Tracking XOR DDoS – Trojan Malware


Akamai’s Security Intelligence Response Team has been tracking XOR DDoS, which is a Trojan malware that DDoS attackers seemed to have used in hijacking Linux machines in building a botnet for distributed denial of service attack campaigns with DNS and SYN floods.

Some of the key points observed by Akamai were that the gaming sector had been the main target, which was followed by educational institutions. The botnet seemed to attack around 20 targets each day, 90% of which were from Asia.

The malware tends to spread through Secure Shell – SSH services vulnerable to brute force attacks owing to weak passwords. This could turn from bad to worse. The team at Akamai expect the XOR DDoS activity would continue since attackers refine and improve their methods, inclusive of a more diverse selection of DDoS types of attack.

Advisory Describing DDoS Mitigation/Malware Removal Information Available


As per the Akamai team, the IP address of the bot seems at times hoaxed though not always. The botnet attacks noticed that in the DDoS campaigns against Akamai consumers were a mixture of hoaxed and non-hoaxed attack traffic. According to Lucian Constantin of IDC News Service recently stated that this power to generate crippling attacks at more than 150 Gbps represent several time greater than a usual company’s organization could endure.

 In the meanwhile an advisory describing this threat inclusive of DDoS mitigation payload analysis as well as malware removal information is made available for download from Akamai. Eliminating the XOR DDoS malware seems to have a four step procedure wherein most of the scripts are provided in the advisory.

Senior vice president and general manager of Akamai, Stuart Scholly has said that XOR DDoS is an example of attackers switching focus and developing botnets utilising compromised Linux systems to launch DDoS outbreaks. This occurs more frequently now than earlier, when Windows machines were the main targets for DDoS malware.

Monday 12 October 2015

Researchers Use Augmented Reality to Turn Coloring Books into 3D Experience

Disney

Colouring App Developed – Disney Research


A colouring app developed by Disney Research could cause characters to spring from the page in a 3D wonderthrough augmented reality. A child tends to colour a character on the book page normally while a smartphone or tablet running the app tends to monitor the drawing.

Based on the colouring of the child, the app fills the colours in real time on a 3D animated version of the character which is visible on the screen of the device and integrates it into a video. The core focus on the traditional activity of the colouring is maintained by the app while providing the magical digital overlay which tends to improves the engagement.

User testing performed by adults rather than the children in the early study, researchers observed that most of the users informed that the app increased their enthusiasm to draw in colouring books while 80% stated that the app increased their feeling of linking with the character.

Disney researchers, ETH Zurich as well as the Swiss university EPFL presented the augmented reality app at the ISMAR 2015 – IEEE International Symposium on Mixed and Augmented Reality in Fukuoka, Japan.

Disney Color & Play


Though the work of the research was presented to scientific audience, it had gone through the tech transfer process already, motivating the commercial product known as `Disney Color and Play’ which was launched earlier in the year by Disney Publishing Worldwide and Bendon.

The work tends to fit in a huge initiative known as Augmented Creativity at Disney Research that aims on utilising augmented reality in improving creative play. Robert W, Sumner, principal research scientist leading the group on animation and interactive graphics at Disney Research stated that `augmented reality holds unique and promising capabilities in bridging between real world activities and digital experiences enabling user in engaging their imagination and boost their creativity.

They are thrilled to have the opportunity in presenting the scientific advances behind this technology and are particularly happy that it is available to consumers, thanks to the cooperation with Disney Publishing’.

App Functions on Device With Camera


The researchers, inorder to create a new experience, at first created animated 3D virtual characters and then utilised custom software in generating 2D line art representations of the characters for colouring book.

 The app functioning on a device with a camera that viewed the user and the colouring book automatically detects the character the user tends to colour, displaying the 3D version. As the child progresses with the colour to the 2D drawing, the app tends to apply the same colour to the 3D characters in the areas visible in the 2D drawing as well as to the remainder of the 3D form which is not visible in the book.

 Owing to the colouring occurring in real time, the illusion is developed that the user is also colouring the blocked areas with the same texturing of the colour. Defining how to apply colour to the blocked areas seems one of the most difficult issue, according to Sumner.

By mirroring the user’s strokes on colours does not seem to work since the patter of colours used for a character’s face would not be the same for the back of the character’s head. The colour also needs to be continuous in order that no seams are seen between the visible areas and the blocked areas or where dissimilar portions of the textures tend to meet.

Google Patent Application is about Head Display with Holograms

patent

Google’s Patent Application for Holograms


Google has filed a patent application regarding holograms and the heading in the application states `Lightguide with several in-coupling holograms for display inhead wearable’. The two inventors named are Evan Richards and John Perreault and the application had been first filed in March 2014. Observer state that this could be linked to hardware platform for Magic Leap’s augmented reality content.

 Josh Constine in TechCrunch commented that `the patent contextualizes Google Inc.chief $542 million funding round for improved reality start-up Magic Leap. In TechCrunch, Constine seems to be asking Google - `when asked about the patent and its significance, he received from Google, a boilerplate no-comment response:

We hold patents on a variety of ideas, some of those ideas later mature into real products or services, and some do not. Prospective product announcement should not necessarily be inferred from our patents’. Jon Mundy had stated in TrustedReviews that the technology discussed in the patent application would overlay computer-generated imagery over the real world, not entirely unlike to Microsoft’s HoloLens.

The patent application reads – Single eye displays are referred as monocular HMDs while double eye displays are considered as binocular HMDs. Some HMDs display only CGI -computer generated image and other types of HMDs are capable of covering CGI overreal world view.

Patent Describes Technology – Several CGI Holograms


The later type of HMD includes come kind of see-through eyepiece and could serve as hardware platform in comprehending augmented reality. With this the viewer’s image of the world is amplified with an overlapping CGI as well as referred to as heads-up display –HUD.

The patent tends to describe technology which would enable several CGI holograms to appear in real world while the user seems to be wearing a see-through smart eyepiece. It would focus on the problem of mapping real world light sources on AR digital substances.

It means holograms, an extremely complicated issue and one which oculus Rift CEO Brendan Iribe stated as a purpose in pursuing VR over AR. The only reference of the field of view is in the list of encounters for headgear though it is expected that Google would be looking into developments on Microsoft’s hard work.

With regards to the uses of AR, Google’s patent states that the `public safety applications comprise of tactical displays of maps and thermal imaging. Other application field consist of transportation, video games,and telecommunications.

Magic Leap – Content Provider for Google Glass


There are sure to be new found applied and leisure applications as the technology evolves, but several of these applications tend to be limited due to the cost, weight, size, field of view and the efficiency of conventional optical system utilised in implementing prevailing HMDsMagic Leap had been very discreet with regards to what hardware its amplified reality software would essentially run on.

Mikhail Avady, StartUp Legal’s founder who had monitored Magic Leap’s latest AR content trademark application, had informed TechCrunch that `they believe Google wants Magic Leap to be the content provider for Google Glass and if they look at the trademark application it shows story and content based trademarks.

 Magic Leap wants to turn the world into a movie theatre and Google want it to be through Glass’.Presently it seems to be all assumption though it could be based on research, patents and investments and hence could be the safest form on which to place your dreams and hopes for the impending of improved reality

Friday 9 October 2015

IBM Breakthrough Improves Carbon Nanotube Scaling Below 10nm

nanotube

IBM – Beneficial Scaling Abilities in Carbon Nanotubes


IBM has invested a great amount of time and effort in researching carbon nanotubes – CNTs in the past few years. The presence of single walled carbon nanotubes together with their marvellous semiconductor properties happened independently at NEC as well as at IBM with Big Blue being interested in capitalizing on the discovery for over a decade.

Researchers at IBM published a paper wherein they claimed to have demonstrated extremely beneficial scaling abilities in carbon nanotubes. Discussions were on, regarding the difficulties of scaling semiconductors since the distance between features tends to contract with each passing generation.

However the specific breakthrough which IBM tends to claim is in an area of chip design and not much has been discussed over it. In the case of conventional silicon, a known problem as semiconductors tends to shrink and the contact area from the metal and semiconductor has not been scaling.

Smaller contact area, generally lead to increased resistance which means higher heat. Manufacturers have battled against these developments with various methods. However the lack of contact scaling seems to be one of the main barriers in pushing silicon to ever smaller sizes.

Carbon Nanotube Technology – Solution to Problem


IBM is of the opinion that its carbon nanotube technology could solve that issue. EETimes has an amazing write-up of the technology, though it amusingly refers to EUV lithography as `already in place’, a declaration which would surprise Intel as well as TSMC. With the recent innovation,Shu-Jen Han, IBM Manager of nanoscale science and technology at its T.K. Watson Research Centre informed EE Times that `they know how to scale and it is no longer the limiting factor for carbon nanotube transistors.

 The new contacts are measured in angstroms and they have just 36 k-ohms of resistance inclusive of both ends’. The new method involves welding – nanowelding – nanotube with molybdenum prior to self-align as transistor channels. The last step is to heat the assembly to around 850C, melting the molybdenum off and developing carbide. Richard Doherty of Envision engineering is of the opinion that this solution gives IBM an exceptional advantage in scaling along the way to 1.8nm.

Group Evaluating Changes to Measuring Standards


IBM could be preparing the technology, in readiness at the 5nm node for the introduction at 3nm and below, according to EETimes. With the method which has already been proven in theory at 9nm, it seems to be a bit of a block to further scaling. However, there are some cautions pointed to these findings.

Firstly, the fact that IBM is presently capable of building p-type transistors utilising this method which does not mean that the technology seems useless. Several of the proposed near term solutions for enhanced silicon scaling depends on various materials for the p-channel and n-channel, though it positively presents additional complexity.

The International Technical Roadmap for Semiconductors had not been issued since 2013 and the group is presently evaluating changes to its measuring standards for formulating latest reports. However the 2013 data set is yet online and viewing it, the roadmap for near term introduction of carbon nanotubes is not very appealing.

How to Tackle the Network Intruders

network_

Spotting intruders on Network


Spotting intruders on network could take a long time and according to Peter Woollacott, head of security firm Huntsman, he states that `the time between attacks and detection could stretch to 200 days. It tends to take so long since there is a shortage of capable security analysts but there seems to be huge amount of technology with provision for threat information’.

Analysis recommends one reason US retailer Target suffered one of the largest data breaks in American corporate history was due to the company’s threat detection systems overwhelmed its security staff with fake alarms and in the midst of all the noise they failed to recognize the real intruders.

There were some clues that infidelity site Ashley Madison had also been exposed by an insider who had taken data from its internal network. According to chief technology officer at Trend Micro, Raimund Genes, and thereason for so much data to siftthrough is due to the intruders changing their tactics.He added that they usually began with a social engineering attack and grab information from Facebook to sound believable, making it appear that they know you’.

Fake Familiarity to Trick People


This fake familiarity tends to trick the people in opening a booby-trapped email, enabling them to steal credential which are then utilised to get at a company network. Probably it could lead to a link which provides the attacker entry to a work computer.

Mr Genes states that for that reason, several firms tend to monitor what occurs on their internal network, a space which earlier they had presumed to be trustworthy. Several of the companies operate on a `castle and moat’ basis though this means that their defences being strong are largely outward facing.

 They could miss the attacks which could come from within, or perhaps by sappers channelling under the walls or vandals that have made their way in tricking them. Rotating their defences inward could resolve this issue. However, May Turner from security firm Solar Winds, states that watching all that internal traffic on an intranet is hard. The infrastructure has got very complex and there are a lot of moving parts.

Machine Power for Information Collection – Essential


On daily operations each device on the network tends to generate information on what it is doing. The image is more complicated by the way modern threat intelligence systems monitor as well report the activity on the intranet which could sum up to million if not billions, with each daily event in need of analysis.

Turner state that the importance lies in understanding what is happening on that network and whether the events seem to be normal. The patterns are probably unique to that network so more traditional approaches established around signatures of known attacks could be less useful.

Gradually companies as well as large organisations are revolving to tools which tend to watch traffic flows around their networks, alerting their staff to irregularities. Several modern attacks those which begin with emails hoaxed to look like they have come from some known person do not resemble an attack since they have used your login name and password.

 It seems like you are logging in. On the contrary, the cyber thieves utilise the stolen identifications to navigate the network and obtain valuable resources. Mr Woollacott is of the opinion that machine power to do some of the information collection is essential. Anomaly detection is great, it is very powerful though it needs to be utilised in combination with high speed procedures

Thursday 8 October 2015

Global Nuclear facilities 'At Risk' of Cyber-Attack

Iran

Cyber-Attacks on Nuclear Power Plants on the Rise


According to a report, the danger of serious cyber-attack on nuclear power plants across the globe is on the rise. It has stated that civil nuclear infrastructure in several nations are not well equipped to defend against such outbreak.

 The report had mentioned that most of the control systems for the organization were insecure by design due to their age. Circulated by the influential Chatham House committee, the report considered cyber defences in power plants across the world over an 18 month period. It stated that cyber criminals, state sponsored hackers as well as terrorists were increasing their online activity which would mean that the risk of a significant net based attack would prevail.

 This kind of attack on nuclear plant though on small scale or unlikely, should be taken seriously due to the harm which would follow if radiation was released. Besides, it is said that even a small scale cyber security instance at a nuclear facility would lead to a disproportionate effect on public opinion as well as the future of the civil nuclear industry.

Research, unfortunately carried out for the study indicated that the UK’s nuclear plants and the related organization did not seem to be adequately protected or prepared due to the industry being converted to digital systems recently.

Increase in Digitisation/Growing Reliance on Commercial Software


Increase in digitisation and growing reliance on commercial software is giving rise to the risk that the nuclear industry tends to face. There seems to be a `pervading myth’ that computer systems in power plants were isolated from the internet due to which, they were immune to the type of cyber-attacks which has evaded other industries.This air gap between the public Internets and nuclear system seems easy to breach with `nothing more than a flash drive’.

It observed that the destructive Stuxnet computer virus infected Iran’s nuclear facilities through this route. The researcher also came across virtual networks together with other links to the public internet on nuclear structure networks.

Some of these seemed to be unknown or forgotten, by those in charge of these organisations. Search engines which had hunted out critical structures had indexed these links making it easy for attackers to locate ways in to networks as well as control systems

Security with Cyber Security – Priority for Power Station Operators


According to chief executive of the Nuclear Industry Association, Keith Parker, he states that `security inclusive of cyber security is an absolute priority for power station operators. All of Britain’s power stations are designed with safety in mind and are stress tested to withstand a huge range of potential incidents. Power station operators tend to work closely with national agencies like the Centre for the Protection of National Infrastructure and other intelligence agencies, to be aware of emerging threats always’.

He added that the industry’s regulator continuously monitors plant safety to protect it from any outside threats.The first international conference with regards to cyber threats facing plants and manufacturing facilities was held in June this year by the International Atomic Energy Agency.

 Yukiya Amano, director of the IAEA had informed during the conference, that both random as well as targeted attacks were directed at nuclear plants. In a keynote address to the conference he commented that `staff responsible for nuclear security needs to know how to repel cyber-attacks and to limit the damage should the system be penetrated.

Google's Algorithm for Happiness

Wisdom

Mindfulness Skills Enhance Emotional Intelligence


Chade-Meng Tan, one of the company’s first engineering employees in Mountain View, a few years ago, noticed that several of his colleagues were stressed out and unhappy at work. Hence he decided to work on something in connection with it.

 He convinced his superiors to permit him in creating a course which would teach employees mindfulness skills enhance emotional intelligence and promote well-being and he transitioned to the HR department to run it.

With his employer’s approval he named it Search Inside Yourself, a corny name which also was the title of his book with regards to the course’s techniques. At the festival of 2015 SXSW in Austin Texas, Meng taught the scientifically proven secret of happiness in three easy steps.

Step One – Calm your mind


With the introduction of his first piece of advice, Meng led the SXSW audience through a small collective breathing exercise in order to calm the fluffy particles in the snow globes in our skulls. He believes of finding easy options of taking a pause during the course of the day and be aware of one’s breath.

On a lighter note, he states that if it tends to be too hard then just think about nothing for a little bit. His book provides more details, focusing on what mediation is and how to start practising on it, quoting a study of mindfulness training which reduces reported anxiety by Jon Kabat-Zinn at the University of Massachusetts Medical School. Meng does not seem to be the only one to recommend that meditation and mindfulness is good for mental health.

Matthieu Ricard, the monk, for instance whom the press has named as `the world’s happiest man’, had written a book about himself. There seems to be some evidence that mindfulness could help to fend off negative thoughts and according to a recent review of 209 studies it was found that the practice could help to treat depression, stress and anxiety. It is worth mentioning that handling depression as well as anxiety is not essentially the same as boosting happiness. Meng’s choice of happiness advice seems to have growing scientific acceptance.

Step Two – Log moments of joy


This means saying to oneself while sipping coffee or laugh at a friend’s joke or while purchasing a shirt that `I am having a moment of joy’. When negative things occur in our life throughout the day we simply hold on to them while the good things are more fleeting and momentary.

Meng states that by consciously accepting the good things, we increase our chances and when we reflect on the day’s happenings, we conclude that it was a happy one. The theory of observing positive experiences counterbalances or outweighs negatives, makes instinctive sense. We could relate to the power of single though short-lived event spoiling a whole day but seldom does the opposite seem to be true.

Step Three – Wish other People to be Happy

According to Meng, selfless thoughts are advantageous since we tend to obtain a lot of joy in giving more than in receiving. Meng makes powerful arguments for the - `I think’ self-evident need to pervade your life with compassion but quotes on study on people acting for others, backing his claim that `kindness is a source of happiness’.

Recent research had made attempts in exploring this effect including one by positive psychology researcher Barbara Fredrickson which ended that we require a 3:1 positive-to-negative ratio of thought in order to free our minds from the tar-paper effect of thinking negative. But this study has proved to be debated with some questioning the mathematical claims made in paper.

Tuesday 6 October 2015

Snapchat will let Brands Advertise on Your Face

Snapchat

Snapchat – Sponsored Lenses


Snapchat will be launching a new advertising format which will enable brands to advertise on people’s selfies. This features is known as `Sponsored lenses’, a latest attempt in Snapchat in order to get revenue from its audience comprising of the youth.Snapchat has launched its first new lenses feature in September, permitting users to cover animations on their faces comprising of massive heart eyes, wrinkles as well as vomit rainbows.

The lenses feature seems active while taking a selfie. Tapping and holding on the reflected image of the face tends to instantly outline map of it and prompts to pick from eight various interactive filter which ranges from simple Photo Booth-style effects to the ones with animations and sound.

Each new ones tend to replace an old one each day and can be utilised on photos or videos. Snapchat has now signed a number of appealing parties which will be replacing vomit rainbows as well as old people’s faces with sponsored animations. As per The Financial Times, it is said that the first of these lenses would probably make its appearance on the platform in time for Halloween, though there has been no indication on which brands would be on board.

Developing New Sponsored Animation


According to a spokeswoman from Snapchat who informed FT states that `the sponsored lenses enable Snapchatters to express themselves and connect with a brand in a really creative and dynamic way’. Another source had apparently reported that Snapchat has been charging up to $750,000 for brands to reach its whole user-base during the course of a big holiday or $450,000 on any normal day.

Moreover, the addition of sponsored content would be added over the top of selfish with personal snaps that would leave some with a feeling of discomfort. Snapchat would probably be developing new sponsored animation and the FT claims Hollywood studios would probably be the first to sign up.

This does not seem to be the first move into in-app advertising of Snapchat. It had teamed up earlier in the year, with communication super group WPP and the Daily Mail to operate on a content marketing collaboration known as Truffle Pig. Besides this, it has also been trailing advertisements in Discover news services such as CNN and Cosmopolitan since January 2015.

Launched Around Halloween


The latest sponsored lenses would be launched on or around Halloween and the prices would be high according to Financial Times report. Taking into account that Snapchat tends to have hundreds of millions of active users every month, the money could ideally go a long way.

Though there is no information on how different or same it would be to the prevailing lenses, Snapchat would be developing them in-house and according to the report it says that the first would probably be from Hollywood studios. This is the fourth revenue stream for Snapchat, besides Discover and the ads placed in daily stories as well as paid replays.

 However, this seems to be unique from the others and rather than passively observing, sponsored lenses are about engaging with brands which will exactly be in your face. Probably as Snapchat has put it across the Financial Times as `sponsored lenses enable Snapchatters to express themselves and connect with a brand in a really creative and dynamic way’.

Face Analysis can Tell What You’ll Buy after Watching Ads

Ads
Image: Daniel Allan/Cultura/Alamy

System by Affective – Pick up Hidden Emotions


A software has been developed that can sense how much one tend to get swayed by marketing by analysing the face as one watches the advertisements. Ad companies seems interested in assessing the reactions of the consumers to their latest TV spots and this is done by bringing in few customers in the office and pose queries to them.

However, the system adopted by Affective, a start up in Waltham, Massachusetts, has the capabilities of picking up hidden emotions by monitoring face movements. The approach according to Daniel McDuff, Affectiva’s principal scientist enables you to find out what the consumer generally thinks from time to time as the ad tends to run and not what they say once it is ended.

He has commented that that `it provides a way of getting at those more genuine, spontaneous interactions and this is their instinctive response. It is not sent through a cognitive filter where they have to evaluate how they feel’.

The software of Affectiva tends to first identify important facial signs like the mouth eyebrows and the tip of the nose. The machine learning algorithms tends to watch how these areas move or how the skin texture and the colour alter in the course of the video. These alterations are then broken down into distinct expressions portraying shifting emotions.

Focus on Emotions – Surprise/Confusion/Happiness


McDuff together with his colleagues, in a study which had been published recently, has asked 1223 people to give his team access to their home webcams while they watched a series of ads for pet supplies, groceries and sweets.

Prior and after the running of the ads, the subject filled out on online surveys was on how likely they would purchase the products shown.As they watched, the software focused on the lookout for emotions like surprise, confusion and happiness.

The researchers then found that they could utilise the facial data to predict precisely, the survey results of someone indicating that they could depend on the analysis of the computer to know if an ad was successful.

McDuff is of the belief that in the future, the system could plug in TV services like Netflix. He states that one can imagine suggesting TV programmes or even movies which people could watch or ads which they would find enjoyable.

Subtle Disparities in Emotional Responses


The team at Affectiva had accumulated a database of more than three million videos of people of various ages, ethnicities and gender. McDuff is of the opinion that there could be subtle disparities in emotional responses.

For instance women seem to have more positive facial expressions than men. However on understanding the respond of various groups, companies could put together ads which could be fine-tuned for certain audiences. Similarly, the data could also be helpful to advertisers to pull their adverts to draw closely the emotions of the viewers.

Michel Wedel, studying consumer science at the University of Maryland in College Park states that automated emotion analysis systems seems to be promising enabling advertisers to cut down an ad, to find out what exactly works and what does not. He adds that it is particularly unobtrusive and does not depend on introspection or recollection.

To do the research through the viewer’s home webcams is an added advantage though it would not be fool-proof. People could be eating a sandwich or turning at the computer or turning their head and so unable to classify their emotions consistently.

Making Liquid Fuels From Sun And Air

CO2

Liquid Fuel for Internal Combustion Engine – Inefficient


Liquid fuel for internal combustion engines is inefficient due to various explosions leading to kinetic work to be done as well as loads of heat together with various other reasons. With the same quantity of energy put in an electric motor and an internal combustion motor, it could produce more usable work for the earlier than the later.

 Moreover, electric motors tend to operate at the same efficiencies over a range of speeds where internal combustion motors need more messing around to alter the speed, besides the torque. Torque is probably at the core of coolness for several vehicles enthusiasts.If one could get the hot car or a motorcycle to go from zero to fast within a second or two, it is considered to be cool even if it tends to have no day to day application.

An electric motor has that potential and internal combustion motor need to be a super motor to perform well. Besides, liquid fuels tend to spill and smell bad and there could be chances of explosion. Electricity on the other hand has its own limitation. We would need to change most of the moving things, in the long run, like vehicles, planes etc. to electric, though fuel would still remain to be important to certain extent.

Liquid Fuel in Flying Machines


Mission critical backup generations which are not needed much but are life or death,are apparently run best on liquid fuels stored long term such as the one at the South Pole research station or in any hospital. We would eventually see electric airplanes though for long time we would apparently have to put liquid fuel in flying machines.

A present issue of Science has a write-up on recent research on machine that takes sunlight, CO2 from the atmosphere and some water producing burnable liquid. The write-up conveys about several alternative research projects which have approached this issue with various levels of success that is very early research though promising.

The job tends to boil down to run combustion in reverse, inserting energy from the sun or other renewable into chemical bonds. According to John Keith, chemist at the University of Pittsburgh in Pennsylvania states that `it is a challenging issue since it is always an uphill battle’. It is what plants tend to do in making sugars they require to grow.

Methanol – Converted to Variation of Products


However, plants only convert around 1% of the energy into chemical energy and to power the industrial society, researchers need to do much better. Keith compares the challenge to putting a man on the moon. The simple method tends to be almost the same in all cases. One could take CO2 molecule and change it to CO by knocking off one Oxygen atom and then combing the CO with H2 to get syngas that can be changed to methanol.

Methanol is a type of alcohol which can be converted into a variation of products. Same process in the widespread use utilises fossil methane as a base molecule rather than atmospheric CO2. A paper is to be published in Advanced Science informing the process which utilises CO and H2 together with photovoltaic generated electricity.

This focuses on a band of sunlight on to a semiconductor panel converting 38% of the incoming energy into electricity at a high voltage. The electricity is shifted to electrodes in two electrochemical cells. One tends to split water molecules while the other splits CO2. Most of the remaining energy in the sunlight is trapped as heat and utilised to preheat the two cells to hundreds of degree, which helps to lower the amount of electricity essential to split water and CO2 molecules by 25%.

Saturday 3 October 2015

Unhackable Kernel could Keep All Computers Safe from Cyberattack

Boeing

Unhackable Operating Systems – Kernel


An autonomous helicopter gunship which seems to be flying over a military base in Arizona suddenly tends to lose radio contact. This is due to hackers taking control of an on-board computer. New Scientist can reveal that US Defense Advanced Research Projects Agency – DARPA utilised a similar scenario in a drill to test the cybersecurity of an unscrewed Boeing Little Bird helicopter.

Inspite of the hackers having unbound access to the computer, and making great attempts to disable the helicopter, crashing the computer, they were unable to disrupt the critical system. DARPA which is focusing in developing an unhackable drone by 2018 as a part of its High Assurance Cyber Military System – HACMS programme, the drill seemed to be successful.

It is said that the software which had kept the helicopter’s computer secure was at the core of its operating system and could be the most appropriate thing what could make everything from pacemakers, insulin pumps, power stations, cars immune to hacking.

Gernot Heiser from the newly formed Australian national research agency, Data61 had commented that his hope was that in 10 years, anything which could be security critical would be running on the system or some other one built on the principles established. One of the predecessors had developed the crucial component of the unhackable operating systems – its kernel.

Central Staple of the Operating System of the Computer


The kernel is said to be the central staple of the operating system of the computer. If the hackers tend to gain access to it, for instance, they could perform actions which could be meant to be prohibited such as turning a mobile phone into a signal jammer. Heiser’s team last year had proved mathematically that their kernel is unhackable.

The kernel, known as seL4, has some highly secured properties and can do only do what it is developed to do. Its code cannot be altered without permission and its memory together with the data transfers cannot be read without permission. Earlier version of it was known as OKL4 which is now on millions of smartphones. Heiser has informed that the two features support seL4’s security and one of it is a new way of isolating data within the kernel.

 However, the main development was making the code proficient of being checked mathematically. The other kernels may tend to have these properties though it would be impossible to know precisely without mathematical proof according to Heiser.

seL4 – Keep the Systems Separate


Two of the hackers in the month of July had played a prank by accessing remotely the computer of a Chrysler Jeep, making it stop abruptly on a highway and then crash it into a ditch. The consequences were that the company recalled 1.4 million vehicles.

The question that arises is – could seL4 prevent such an incident in the future?Heiser informs that one cannot stop hackers from gaining access to things like a car’s entertainment system, if it communicates through Wi-Fi. Hackers often tend to use non critical systems as a springboard to critical areas such as steering as in the case of the Jeep prank.

However, the seL4 kernel could keep the systems separate. According to Heiser,there are attempts occurring to roll this out to cars in order to protect them. It seems a big deal for cybersecurity according to Iman Shames from the University of Melbourne in Australia who states that there are ways to attack hardware even if the software is secure. Hackers could be capable of tricking the sensors of a device or jam incoming communication or any other signal which could be quite overwhelming.

Microsoft has Developed Its Own Linux

Microsoft_Linux

Microsoft’s Own Linux Distribution


Microsoft has created its own Linux distribution with Azure running its networking. Redmond has revealed that it has built something known as Azure Cloud Switch – ACS, defining it as a cross platform modular operating system for data centre networking.

This is built on Linux and the foray in building their own software to run network devices like switches.It is supposed to make it easy for the IT pros in managing their networking infrastructure over various types of hardware. It is especially important while running a bunch of networks across a group of data centres at cloud computing scales.

The important element is that Microsoft has envisaged a problem and decided to create Linux, as the best option to fix it. ACS has also permitted Microsoft to share the software stack across hardware from various switch vendors which is done through the Switch Abstraction Interface – SAI specification.

 This is the first open standard C API in programming network switching ASICs of the Open Compute Project – OCP.Redmond’s main architect from Azure Networking, Kamala Subramaniam has written that `at Microsoft, they are of the belief that there are several excellent switch hardware platforms available in the market, together with healthy competition among several vendors driving innovation, increases in speed together with reduction in costs.

Challenges – Integrating Totally Different Software


However, what the cloud and enterprise networks found challenging was that it is integrating totally different software operating on each of the different kind of switch in a cloud-wide network management platform. One would prefer all the benefits of the features implemented and the bugs fixed to stay on even as one goes with the tide of updated switch hardware innovation.

The software-defined networking – SDN is a fine idea. However, it seemed that Redmond did not find the SDN code to accommodate its particular needs and so it required to build new systems based on what the other industry were using and the experience includes Linux and not Windows as the path to SDN.

 It states ACS…. focuses on feature development based on Microsoft priorities and enable to debug, fix and test software bugs much quicker. Moreover it also enables the flexibility to scale down the software and create features which are essential for their datacentre as well as their networking needs.

ACS – Designed to Utilise Switch Abstraction Interface


ACS has been designed to utilise Switch Abstraction Interface, an OpenCompute attempt which provides an API for programming ASICs internal network devices. Microsoft’s post exposing ACS states a fair amount about its features, though it does not clarify the association between Microsoft and Linux. Probably the complexity of theswitching ecosystem of the world could be the reason.

 Redmond has commented that it has demonstrated ACS across with `four ASIC vendors namely Mellanox, Broadcom, Cavium and the Barefoot software switch, six implementation of SAI – Broadcom, Dell, Mellanox, Cavium, Barefoot and Metaswitch with three applications stacks – Microsoft, Dell and Metaswitch.

Subramaniam ends his post by conveying that they were talking about ACS publicly as they were of the belief that this approach of disaggregating the switch software from the switch hardware would tend to continue as a growing trend in the networking industry and that they would like to contribute their insights as well as experiences to the journey starting from here.

Friday 2 October 2015

Top Gadgets and Accessories for Hardware and Data Security

Buffalo

Encrypted Hard Drives to NFC Blockers


Hardware security solutions could help in preventing access to data and tends to offer some strong protection against tampering as well as unauthorized access on the devices. In order to securing data and physical items, one could consider investing in an encrypted NFC hard drives.Encrypted hard drives to NFC blockers have various options of protecting yourself and your data. The following gadgets and accessories could be helpful to the users according to their requirements:

Buffalo MiniStation Extreme NFC encrypted storage


Encrypted drives such as the Buffalo’s MiniStation Extreme NFC encrypted storage HD utilises NFC technology to prevent unauthorized access to information that could be stored on the device. User would find it difficult to unlock and access information from external smart card, removing the requirement for a password which could be tampered. An added benefit of the storage device is the military grade shock, dust and water protection which tends to protect the data from getting corrupted or lost in the event of it being dropped. One could get hold of a 1TB option for $129.99 or a 2TB drivefor $199.99.

iStorage datAshur Pro USB 3.0 secure flash drive


Should the need of something secure though smaller be essential, iStorage’s datAshur Pro USB 3.0 secure flash drive is the choice. Focused for business and government users, the flash drive includes FIPS 140-2 level 3, CESG CPA Foundation Grade together with NLNCSA level 2 accreditation together with 256-bit hardware encryption, a read only protect mode. A brute force hack detection tool is also included which tends to aid in keeping the data secure in case of theft or loss. The range of datAshur Pro is available from £69 to £129 in 8, 16, 32 and 64 GB models.

3M mobile device privacy filters


These are available for smaller mobile devices and laptops and are a sure way in stopping users from snooping on your phones when one could be using their devices. The anti-glare, transparent screen is placed across the display which tends to reduce the visibility and stops anyone from viewing at an angle. The right size depending on the dimension and brand with varying prices could be obtained accordingly.

Laptop Lock


One could consider investing in a simple laptop lock for a simple way of protecting the device and the data. Ruban’s laptops lock and cable system is available at $9.90 which is complete with a four digit lock that can swiftly attach the PC to a table when left for a moment. Though being away from the desk for a short while could mean that you come back to an empty surface, this simple lock could prevent a lot.

The Wocket smart wallet


A cause for worry for consumers is theft or loss of their credit cards. The Wocket smart wallet helps to store securely these cards together with permitting a one-time uses of various credit cards through a single physical card that has been provided by the company. This helps in enabling you to replace all the cards with a single one. To use the physical card one could swipe the credit or loyalty cards, get the verification of the identity through a PIN code and biometrics and thereafter Wocket utilises a wireless connection to pair with a payment provider. Chip and PIN does not support this system. One could store up to 10,000 cards together with other data inclusive of passwords.

Mobile device PIN codes, biometric scanners


This seems to be an easy to setup option in protecting the device and does not cost much, sadly often overlooked. By taking time in order to set up a digital PIN code password or a pattern on mobile device or to take advantage of biometric fingerprint readers, could help in stopping your personal data going into wrong hands in the event of theft or loss.

Yubico YubiKey Neo


These ranges of items are keys that tend to secure application. The keys which are adequately small to fit on the keychain tends to plug into devices to secure apps and services inclusive of remote access VPNs, password managers, online logins like Gmail and open source and enterprise solutions. The YubiKey backs the USB and contactless protocols, one-time passwords, OpenPGP and PIB. They can also be configured for utilisation with the Universal 2nd Factor –U2F protocol. YubiKey NEO or NEO is available for $50.

Silent Pocket RFID blocker


With the combination of fashion together with the post Snowden flow in privacy trimmings, Silent Pocket’s v2 range come with smooth leather wallets, briefcases as well as bags comprising of flat magnetic seal for the prevention of RFID, cellular, indicators getting through from Wi-Fi, GPS, NFC and Bluetooth. By averting these signals from getting to your cards, users could help in the prevention identity and credit card theft together with device tracking, staying off the grid in the process. The v2 range can be pre-ordered and is available in the price range from $16.95 to $675

Thursday 1 October 2015

Boeing Patents an Aircraft Engine Run by Lasers and Nuclear Fusion

Boeing

Boeing Patents for Laser & Nuclear Driven Airplane Engine


Recently, the U.S. Patent and Trademark Office had approved an application from Robert Budica, James Herzberg and Frank Chandler from Boeing, for a laser and nuclear driven airplane engine.Future aircraft could now be powered by lasers and nuclear explosions if Boeing intends to have its way.

The technology would mean that the spaceships and planes would need only a fraction of power for operating as per the recent patent filed by the company. Airplane makers are continuously on the look-outin finding new and efficient options of powering their products and this laser engine seems to be the latest notion by the engineers at Boeing.

The idea patented was to make air travel an efficient one. Presently we have airplanes like the Solar Impulse 2 which uses only solar energy to travel across Pacific and intends going on a world tour. For a long time now, airlines have been attempting to come up with concepts to decrease carbon emissions and nuclear powered airplanes would be great innovation.

The engineers give some insight on how the nuclear powered tend to work. The radioactive material is vaporized by a targeted Laser on them, leading to a controlled Nuclear Fusion reaction with high energy neutrons discharging out.

Boeing Dreamliner Powered by Several Turbofan Engines


Besides the radioactive material, the engine requires very little with regards to external energy. The high energy matter is absorbed which then propels the aircraft forward.As all the nuclear reactions tend to go, it sustains itself.

The uranium 238 which is coated on the interior of the thruster’s wall undergoes nuclear splitting when struck by high energy neutrons that are generated by the earlier reaction. This tends to generate plenty of heat. Heat that is from the fusion chamber is cooled off and directed to a generator which powers the Laser.

All this seems quite convincing on paper though several queries with regards to controlling the nuclear reactions and its safety tend to come up.Modern airliners like the Boeing Dreamliner are powered by several turbofan engines which organize a series of fans as well as turbines to compress air and ignite fuel in order to provide push.

Power Rockets/Missiles/Spacecraft


The newly patented engine of Boeing provides push in a different and unique way and as per the patent filing, the laser engine could also be utilised in powering rockets, missiles as well a spacecraft. This is one of the ideas which the engineers have proposed to power an airplane. Bio-fuels too have been in testing for a long time.

 According to United Airlines, flights which tend to run on fuel resulting from farm waste would soon begin from San Francisco and Los Angeles. These seem to be the main steps being adopted in helping to protect the environment. Up to now, the engine tends to live only in patent document and the technology is such that it is unclear if anyone would ever intend to build it.

It seems to be one of those patents which in no way indicate that the company that filed it intends working on what the patent is patenting. This is because Boeing does not seem to be actively developing a laser triggered fusion powered jet engine. Speculations are on whether the nuclear powered airplanes would become a reality or not.

Brain Translator lets Paraplegic Man Walk with Own Legs Again

Paraplegic_Man

Technique – Re-routing Brain Signals to Paraplegic Patient


A ground breaking technique in re-routing brain signals directly to the knees has aided a paraplegic man to walk once again with his legs for the first time after suffering from a spinal cord injury – SCI.The American patient of 26 years, who had met with an accident, had lost the ability of using his legs five year back.

However researcher at the University of California at Irvine managed to restore the link between his brain and legs, enabling him to walk once again without the need of robotic limbs. The patient could walk a distance of 3.5 meters donning a cap that was fitted with electrodes which could pick up brain signals, sending them wirelessly to a computer.

 The computers interpreted the signals and sent the decision to walk or stand still to a micro controller placed on the man’s belt, thus triggering the nerves on his legs. According to the researchers as reported in the Journal of Neuro-engineering and Rehabilitation, the system is not seemingly a plug and play and the patient requires wide training on the utilisation of it. The patient begins by wearing the cap and moves a character on a screen for the purpose of building up the potential of producing clear signals for the system to understand.

20 Sessions – 19 Weeks of Work


Thereafter the patient is totally put off to learn how to move his legs and refine the movement in order to walk. He would also need support in training his muscles to support his own weight.

According to the team, the procedure tends to take around 20 sessions in order to help the patient to walk, amounting to around 19 weeks of work. In due course, he was capable of holding basic conversation while walking.

 The system, instead of reading `walk left’ and `walk right’, relied on differentiating between `walk/don’t walk’ signals, which meant that the movement achieved by him was restricted. Beside the team also mentioned that the proof of concept study was dynamic in portraying that the brain could yet develop signals useful for walking, years after the ability had been lost.

Braingate and its successors, the future systems that are capable of more accurate collection and interpreting brain signals, could utilise the similar concept, possibly, to restore movement in a more broad sense.

Provided Proof-of-Concept for Direct Brain Control


The paper reported that the consequences provided a proof-of-concept for direct brain control of lower extremity prosthesis in order to restore basic ground walking after suffering from paraplegia due to spinal cord injury.

The system reported here represented an important step towards the development of technologies which could restore or progress walking in case of paraplegia patients due to SCI. Dr An Do, who co-led the study had informed the Guardian, that the system seemed to be an advance over those who use robotic exoskeletons.

She stated that they have showed that one can restore intuitive, brain controlled walking after complete spinal cord injury and the non-invasive system for leg muscle stimulation seems to be a promising method. It is an advance on present brain controlled system that utilises virtual reality or a robotic exoskeleton.

The next stage seems to be to ensure that the computer does not tend to mix up signals for balance and precision with walking and to find out other options for various and more natural kinds of movement which can be translated by the system.