Menu

Blog

Page 2845

May 16, 2023

Robot injected in the skull spreads its tentacles to monitor the brain

Posted by in category: robotics/AI

A soft robot inserted through a hole in the skull can deploy six sensor-filled legs on the surface of the brain to monitor electrical activity. The design has been tested in miniature pigs and could someday help people who experience epileptic seizures.

By Jeremy Hsu

May 16, 2023

3D printing of unsupported multi-scale and large-span ceramic via near-infrared assisted direct ink writing Communications

Posted by in categories: 3D printing, materials

In the three-dimensional printing process of ceramic with low-angle structures, additional supporting structures are usually employed to avoid collapse of overhanging parts. However, the extra supporting structures not only affect printing efficiency, but the problems caused by their removal are also a matter of concern. Herein, we present a ceramic printing method, which can realize printing of unsupported multi-scale and large-span ceramics through the combination of direct ink writing and near-infrared induced up-conversion particles-assisted photopolymerization. This printing technology enables in-situ curing of multi-scale filaments with diameters ranging from 410 µm to 3.50 mm, and ceramic structures of torsion spring, three-dimensional bending and cantilever beam were successfully constructed through unsupported printing. This method will bring more innovation to the unsupported 3D manufacturing of complex shape ceramics.


In 3D ceramic printing, the need for additional supports can increase processing time and introduce defects during post-processing removal. Here, authors merge direct ink writing and up-conversion particles-assisted photopolymerization under near-infrared irradiation for support-free printing with controlled curing rates reducing material waste, printing time, and post-processing steps.

May 16, 2023

Researchers develop a paper-thin loudspeaker

Posted by in category: energy

The flexible, thin-film device has the potential to make any surface into a low-power, high-quality audio source.

May 16, 2023

Quantum Experiment Shows How Einstein Was Wrong About One Thing

Posted by in categories: particle physics, quantum physics

Albert Einstein wasn’t entirely convinced about quantum mechanics, suggesting our understanding of it was incomplete. In particular, Einstein took issue with entanglement, the notion that a particle could be affected by another particle that wasn’t close by.

Experiments since have shown that quantum entanglement is indeed possible and that two entangled particles can be connected over a distance. Now a new experiment further confirms it, and in a way we haven’t seen before.

In the new experiment, scientists used a 30-meter-long tube cooled to close to absolute zero to run a Bell test: a random measurement on two entangled qubit (quantum bit) particles at the same time.

May 16, 2023

OpenAI unveils ChatGPT plugins, but there’s a catch

Posted by in category: robotics/AI

The new rollout offers around 70 third-party plugins designed to enhance the capabilities of ChatGPT.

May 16, 2023

Hyperion CEO — Company Overview

Posted by in category: futurism

Hydrogen? 🤔


CEO — Angelo Kafantaris discuses the various components of Hyperion and the space age technology in the XP-1. This is just the beginning of what is to come!

May 16, 2023

5 ways AI-driven patch management is driving the future of cybersecurity

Posted by in categories: cybercrime/malcode, robotics/AI

Join top executives in San Francisco on July 11–12, to hear how leaders are integrating and optimizing AI investments for success. Learn More

Patch management approaches that aren’t data-driven are breaches waiting to happen. Attackers are weaponizing years-old CVEs because security teams are waiting until a breach happens before they prioritize patch management.

Cyberattackers’ growing tradecraft now includes greater contextual intelligence about which CVEs are most vulnerable. The result: Manual approaches to patch management — or overloading endpoints with too many agents — leaves attack surfaces unprotected, with exploitable memory conflicts.

May 16, 2023

Study finds the brain reacts differently to touch depending on context

Posted by in category: neuroscience

The touch of another person may increase levels of the “feel-good” hormone oxytocin. But the context really matters. The situation impacts oxytocin levels not only in the moment, but also later, as is shown by researchers at Linköping University and the University of Skövde in Sweden. Their study has been published in the journal eLife.

An embrace from a parent, a warm hand on your shoulder or a caress from a are examples of how touch can strengthen between people and influence emotions. But although touch and the sense of touch have a very important function, knowledge of how this actually works is still lacking.

Studies in animals have shown that the is linked to touch and social bonding. However, many questions remain unanswered when it comes to ’s role in human social interactions and how this hormone can influence and be influenced by the brain. To study this more closely, researchers have examined what happens in the body when we feel a soft touch.

May 16, 2023

Human DNA Is All Over The Planet, And Scientists Are Worried

Posted by in categories: biotech/medical, chemistry

Every skin flake, hair follicle, eyelash, and spit drop cast from your body contains instructions written in a chemical code, one that is unique to you.

According to a new study, technology has advanced to the point that it’s now possible to sift scraps of human DNA out of the air, water, or soil and decipher personal details about the individuals who dropped them.

As useful as this might seem, the study’s authors warn society might not be prepared for the consequences.

May 15, 2023

Break the DDoS Attack Loop With Rate Limiting

Posted by in categories: cybercrime/malcode, engineering

Distributed denial-of-service (DDoS) attacks are growing in frequency and sophistication, thanks to the number of attack tools available for a couple of dollars on the Dark Web and criminal marketplaces. Numerous organizations became victims in 2022, from the Port of London Authority to Ukraine’s national postal service.

Security leaders are already combating DDoS attacks by monitoring network traffic patterns, implementing firewalls, and using content delivery networks (CDNs) to distribute traffic across multiple servers. But putting more security controls in place can also result in more DDoS false positives — legitimate traffic that’s not part of an attack but still requires analysts to take steps to mitigate before it causes service disruptions and brand damage.

Rate limiting is often considered the best method for efficient DDoS mitigation: URL-specific rate limiting prevents 47% of DDoS attacks, according to Indusface’s “State of Application Security Q4 2022” report. However, the reality is that few engineering leaders know how to use it effectively. Here’s how to employ rate limiting effectively while avoiding false positives.