Toggle light / dark theme

Featured Image Source: SpaceX / FCC document.

SpaceX is in the process of building its Starlink broadband internet network that will offer service worldwide to fund future missions to the moon and Mars. The aerospace company has been deploying internet-beaming Starlink satellites into low Earth orbit. As of today, there is a total of 540 satellites in space, out of the 12,000 SpaceX plans to deploy. The next deployment of 57 satellites is scheduled for this month [date pending]. Company officials said 800 satellites will offer “moderate” internet coverage; 60 Starlink satellites can provide service to 40,000 customers streaming high-definition videos simultaneously. “With performance that far surpasses that of traditional satellite internet, and a global network unbounded by ground infrastructure limitations, Starlink will deliver high-speed broadband internet to locations where access has been unreliable, expensive, or completely unavailable,” the company website states.

What is more powerful than suction cup and even a vacuum pump, but was not invented by humans?

Answer: a gecko’s foot. NASA has decided to copy the lizard’s incredible gripping technology, which relies on electrostatic attractions, in its Gecko Gripper robot. This is not coming from an internet troll trying to sell car insurance. The space agency partnered with OnRobot, which specializes in finger-like robotic grippers, to create a device that can (so far) lift 14 pounds. The radiation-resistant pads could literally mean a huge step forward for getting around in space.

Imagine a manufacturing plant in which all the production equipment is continually changing in response to market needs. Robots churning out widgets, for instance, would reconfigure themselves based on data coming in from all points of the widget supply chain, as well as sensors monitoring the factory itself. The result is a smart factory that’s more agile and autonomous than previous generations of automation.

Also known as Industry 4.0, the smart factory runs on data and artificial intelligence, but connectivity forms the backbone of operations. The new fifth generation of mobile networks (5G) is a catalyst for this new industrial revolution because it offers much greater speed and bandwidth than previous networks, as well as low latency, or time required for data to travel between two points. 5G will work with and in some cases replace existing fixed, wired connections, making manufacturing more flexible and ready to implement innovations.

5G could replace wired Ethernet as well as Wi-Fi and 4G LTE networks that connect devices in factories, but one 5G supplier is starting with the basics: powering mobile devices and robots. At a new factory in Lewisville, Texas, Swedish telecom Ericsson has been turning out 5G infrastructure equipment with the aid of a 5G network in the plant itself. Ericsson, which is supplying 5G equipment to telecoms in the U.S. such as AT&T, Verizon, Sprint and T-Mobile, has forecast 190 million 5G subscribers by the end of 2020 and 2.8 billion by the end of 2025.

Electronic systems – from the processors powering smartphones to the embedded devices keeping the Internet of Things humming – have become a critical part of daily life. The security of these systems is of paramount importance to the Department of Defense (DoD), commercial industry, and beyond. To help protect these systems from common means of exploitation, DARPA launched the System Security Integration Through Hardware and Firmware (SSITH) program in 2017. Instead of relying on patches to ensure the safety of our software applications, SSITH seeks to address the underlying hardware vulnerabilities at the source. Research teams are developing hardware security architectures and tools that protect electronic systems against common classes of hardware vulnerabilities exploited through software.

To help harden the SSITH hardware security protections in development, DARPA today announced its first ever bug bounty program called, the Finding Exploits to Thwart Tampering (FETT) Bug Bounty. FETT aims to utilize hundreds of ethical researchers, analysts, and reverse engineers to deep dive into the hardware architectures in development and uncover potential vulnerabilities or flaws that could weaken their defenses. DARPA is partnering with the DoD’s Defense Digital Service (DDS) and Synack, a trusted crowdsourced security company on this effort. In particular, FETT will utilize Synack’s existing community of vetted, ethical researchers as well as artificial intelligence (AI) and machine learning (ML) enabled technology along with their established vulnerability disclosure process to execute the crowdsourced security engagement.

Bug bounty programs are commonly used to assess and verify the security of a given technology, leveraging monetary rewards to encourage hackers to report potential weaknesses, flaws, or bugs in the technology. This form of public Red Teaming allows organizations or individual developers to address the disclosed issues, potentially before they become significant security challenges.

:3333


Quantum computers (QC) are poised to drive important advances in several domains, including medicine, material science and internet security. While current QC systems are small, several industry and academic efforts are underway to build large systems with many hundred qubits.

Towards this, computer scientists at Princeton University and physicists from Duke University collaborated to develop methods to design the next generation of quantum computers. Their study focused on QC systems built using trapped ion (TI) technology, which is one of the current front-running QC hardware technologies. By bringing together computer architecture techniques and device simulations, the team showed that co-designing near-term hardware with applications can potentially improve the reliability of TI systems by up to four orders of magnitude.

Their study was conducted as a part of the Software-Tailored Architecture for Quantum co-design (STAQ) project, an NSF funded collaborative research effort to build an trapped-ion quantum computer and the NSF CISE Expedition in Computing Enabling Practical-Scale Quantum Computing (EPiQC) project. It was published recently in the 2020 ACM/IEEE International Symposium on Computer Architecture.

You might think you’ve seen it all via live stream. Whether it’s historic astronaut launches, the strawberry moon, or new videogame console reveals, it’s easy to take our ability to see things unfold in real-time over the internet for granted.

And yet, there’s one frontier we’ve yet to fully breached — the deep sea. Communication through water isn’t quite as simple as through air and space.

Now, a new study shows that a type of aquatic internet can send data through light beams to allow divers to instantly stream footage from under the sea to the surface.


This is the “first time anyone has used the internet underwater completely wirelessly,” one of the researchers said.

The weather forecast looks mostly favorable for the Space Coast’s next launch, a mission slated to see a 230-foot SpaceX Falcon 9 rocket take flight from Kennedy Space Center on Wednesday.

Conditions are shaping up to be 70% “go” for the 11:59 a.m. liftoff from pad 39A, the Space Force said Sunday, thanks to the movement of drier air. Teams will have until 12:05 p.m. to launch.

“On Wednesday, some drier mid-level air will likely move into the area, helping to limit shower and storm coverage compared to earlier in the week,” the 45th Weather Squadron said. “The primary concern for the launch window is the cumulus cloud rule.”