Menu

Blog

Archive for the ‘internet’ category: Page 77

Aug 2, 2022

Already Did It’: Elon Musk Confirms He Copied His Brain to the Cloud and Talks to His Digital Version and All We Can Think is ‘What is This Guy Even…

Posted by in categories: computing, cryptocurrencies, Elon Musk, internet, neuroscience, sex, sustainability

Elon Musk, often known to break the Internet by his statements or acts recently tweeted what seemed like a futuristic invention. Being one of the wealthiest people on the planet was not enough for the CEO of Tesla as he thought two of his brains would be better. One would always wonder how a brain can be transferred into a man-made machine, but with his recent tweet, Elon Musk confirmed he copied his brain to the machine and talks to his digital version.

Read More, ‘I haven’t had sex in ages’: Elon Musk Defends Himself Against Affair Allegations With Google’s Sergey Brin’s Wife, Fans Say He’s a Snake For Forgetting Brin’s Loan To Build Tesla

A recent tweet by Shibetoshi Nakamoto, known as the creator of Dogecoin with an account named, @BillyM2k asked, “If you could upload your brain to the cloud, and talk to a virtual version of yourself, would you be buddies?”. In the second continuation of the tweet, the user posted, “would be cool to have a competitive game buddy of approximately the same skill level. Except he would be a computer and have infinite time so I would more just see him get better at everything while I am busy with dumb life things.

Aug 2, 2022

New AI Detects Anomalies in Oil and Gas Industry

Posted by in categories: drones, internet, robotics/AI

This post is also available in: he עברית (Hebrew)

A US Robotics company is adding new artificial intelligence anomaly detection capabilities to its autonomous Scout System drone. A leading US provider of private wireless data, drone and automated data has announced that the new containment capabilities will enable oil and gas customers to minimize environmental risks, clean-up costs, fines, and litigation expenses.

Suasnews.com reports that the loss of containment analytics feature will accelerate early detection and location of crude oil leaks before they become critical to customers by providing frequent, autonomous inspections of oil and gas pumpjacks, heater treaters, tanks, pipes, pumps, and more via the autonomous Scout System. Autonomous drones have become a crucial component to ensuring safety and conducting regular inspections within the oil and gas industry.

Jul 31, 2022

SpaceX shares how it’s making Starlink satellite less bright

Posted by in categories: internet, satellites

SpaceX shared how it’s making its Starlink satellites less bright. The space exploration company published a document titled, Brightness Mitigation Best Practices for Satellite Operators that outlines how it’s working with the astronomy community to reduce light pollution.

New document from @SpaceX https://api.starlink.com/public-files/BrightnessMitigationBe…rators.pdf explaining what they have been doing to make their satellites less bright. I applaud SpaceX for their work on this (and for making the document public), while remaining concerned to see how bright the Gen2 Starlinks end up being.

— Jonathan McDowell (@planet4589) July 29, 2022

Jul 30, 2022

Fighting counterfeit with carbon nanotubes

Posted by in categories: cybercrime/malcode, encryption, internet, nanotechnology, quantum physics

The ubiquity of electronic devices makes it essential to use encryption and anti-counterfeiting tools to protect the privacy and security of users. With the growing expansion of the Internet of Things, protection against attacks that violate the authenticity of products is increasingly necessary. Traditionally, message protection has been based on different systems: passwords, digital signatures or encryption. This cryptography is based on unknown keys to a possible attacker, but unfortunately these systems are becoming obsolete as new more invasive attacks appear: malware, API attacks or physical hardware attacks.

While quantum computing slowly progresses towards the cryptographic paradigm, the so-called physically unclonable functions (PUFs) are presented as the choice to ensure unique and effective identification. A PUF is a device that has unique and non-repeatable physical properties that can be translated into usable bits of information. The idea of applying random to identify systems or people is not new: for example, the identification of individuals using the fingerprint dates from the 19th century. More recently, the identity of electronic devices has been established using PUFs, which are “electronic fingerprints” of an integrated circuit.

Authentication based on PUFs comprises a chip manufactured by intrinsically random processes that make cloning almost impossible, even though all the details of the manufacturing process are known. The measurements of the various physical properties of the PUF depend on the properties of the chip at the nanoscale, thus constitute a very powerful anti-fraud and anti-counterfeiting technology. To be implementable at an industrial level, this chip must be low cost, scalable and its properties must be easily measurable by means of an identifiable function.

Jul 30, 2022

Cybersecurity for critical infrastructure approved in $840 billion defense bill

Posted by in categories: cybercrime/malcode, government, internet

“In the nearly 22 years that I’ve served in Congress, we have come a long way in cyberspace,” said Rep. Jim Langevin, D-R.I.

Jul 29, 2022

You Can Build A Giant 7-Segment Display Of Your Very Own

Posted by in category: internet

Sometimes you need to display a number nice and large, making it easily readable at a good distance. [Lewis] has just the thing for that: a big expandable 7-segment display.

The build is modular, allowing it to be extended from 2 to 10 digits and beyond. The digits themselves are made of 3D-printed parts assembled onto acrylic. These can then be ganged up in a wooden frame for displaying larger numbers with more digits. Individual elements are lit by addressable LEDs, and the project can be built using an Arduino Nano or an ESP8266 for control. The latter opens up possibilities for controlling the screen over WiFi, which could prove useful.

Continue reading “You Can Build A Giant 7-Segment Display Of Your Very Own” »

Jul 29, 2022

Ultrafast Switch from a Bose-Einstein Condensate

Posted by in categories: internet, quantum physics

On the road to a quantum internet, researchers demonstrate entanglement of two memory elements located 12.5 km apart in an urban environment.

Jul 29, 2022

Distant Memories Entangled

Posted by in categories: internet, quantum physics

On the road to a quantum internet, researchers demonstrate entanglement of two memory elements located 12.5 km apart in an urban environment.

Jul 29, 2022

This IoT device notifies you before an Earth-obliterating supernova

Posted by in categories: cosmology, internet

Would you like a warning before the world ends?

Well, it’s now possible. Extraluminal is an Internet of Things (IoT) device that will notify you an hour before the Earth is about to be destroyed by a supernova.

A supernova refers to “the cataclysmic explosion of a massive star at the end of its life. It can emit more energy in a few seconds than our sun will radiate in its lifetime of billions of years.”

Jul 28, 2022

Twin physically unclonable functions (PUFs) based on carbon nanotube arrays to enhance the security of communications

Posted by in categories: computing, encryption, internet, nanotechnology, security

As the amount of data stored in devices and shared over the internet continuously increases, computer scientists worldwide are trying to devise new approaches to secure communications and protect sensitive information. Some of the most well-established and valuable approaches are cryptographic techniques, which essentially encrypt (i.e., transform) data and texts exchanged between two or more parties, so that only senders and receivers can view it in its original form.

Physical unclonable functions (PUFs), devices that exploit “random imperfections” unavoidably introduced during the manufacturing of devices to give physical entities unique “fingerprints” (i.e., trust anchors). In recent years, these devices have proved to be particularly valuable for creating , which are instantly erased as soon as they are used.

Researchers at Peking University and Jihua Laboratory have recently introduced a new system to generate cryptographic primitives, consisting of two identical PUFs based on aligned carbon nanotube (CNT) arrays. This system, introduced in a paper published in Nature Electronics, could help to secure communications more reliably, overcoming some of the vulnerabilities of previously proposed PUF devices.

Page 77 of 290First7475767778798081Last