Menu

Blog

Archive for the ‘security’ category: Page 115

Aug 17, 2016

DARPA’s EXTREME Program will Manipulate Light to Strengthen US National Security

Posted by in categories: materials, security

It aims to introduce engineered optical materials (EnMats) and associated design tools for creating innovative optical systems with improved performance, new functionality, and drastically reduced size and weight.

It will do this by finding ways to manipulate light in ways beyond the conventions of classical reflection and refraction, delivering optical systems the size of a sugar cube.

If successful, EXTREME could introduce a new era in optics and imagers for national defense.

Continue reading “DARPA’s EXTREME Program will Manipulate Light to Strengthen US National Security” »

Aug 15, 2016

IARPA looks to reinvent the virtual desktop

Posted by in categories: security, virtual reality

The Intelligence Community’s research agency is exploring the use of role-based virtual environments to enhance security.

Read more

Aug 15, 2016

A Quantum Computing-Dominated World Is Coming In Less Than 10 Years, Says CEO Of Acronis

Posted by in categories: quantum physics, security, solar power, supercomputing, sustainability

I told folks this; I see another one from Google has joined the QC less than 10 year club. My guess is more likely less than 7 years.


A seminal moment in the quantum technology field just happened: Google’s team of scientists have simulated a hydrogen molecule from its quantum computers, a breakthrough that suggests it could “simulate even larger chemical systems,” writes one of Google Quantum’s engineers, Ryan Rabbush. The search engine’s achievement underscores the technology’s potential as Rabbush posits it can “revolutionize the design of solar cells, industrial catalysts, batteries, flexible electronics, medicines, materials and more.”

As advances in such supercomputers continue, investment and research in this field gathers greater momentum as Google, Alibaba, Baidu, Amazon and other tech giants and governments too are racing to develop this technology. Recently, the European Commission allocated €1 billion to research, incubate and invest in quantum technologies. Meanwhile Google last month made headlines about testing its quantum security to shield its Chrome browser.

Continue reading “A Quantum Computing-Dominated World Is Coming In Less Than 10 Years, Says CEO Of Acronis” »

Aug 15, 2016

China launches ‘hack-proof’ quantum satellite in world first

Posted by in categories: encryption, quantum physics, security, space

This is so exciting.


The transfer of data using quantum communications is considered impenetrable due to a particle phenomenon known as quantum entanglement, with eavesdroppers unable to monitor the transfer without altering the quantum state and thereby being detected. In theory, two parties can communicate in secret by sharing an encryption key encoded in a string of photons.

China’s big-spending quantum research initiative, part of Beijing’s broader multi-billion dollar strategy to overtake the West in science and space research, is being closely watched in global scientific research and security circles, with groups from Canada, Japan, Singapore and Europe also planning their own quantum space experiments.

Continue reading “China launches ‘hack-proof’ quantum satellite in world first” »

Aug 14, 2016

WEF: These are the technologies that will transform finance over the next few decades

Posted by in categories: biotech/medical, computing, finance, internet, mobile phones, privacy, security, singularity

Like this article; there is 2 more pieces missing from the roadmap for 2010 & beyond and that is Biocomputing & Singularity. Biocomputing will provide the financial industry (banks, trading firms, accounting & audit firms, bond insurers, etc.) the ability to expand information/ data storage and transmission capacities like we have never see before just look at what Microsoft, Google, Amazon, etc. have done with DNA storage. And, the much loved Singularity enables boosting of knowledge and insights as well as more mobility and access to information as they need it. BTW — Biometrics is NOT the same as Biocomputing; biocomputing goes well beyond security/ identity management.


The influential non-profit rates these technologies alongside the PC, the internet, and smartphones in terms of their potential to transform financial…

Read more

Aug 11, 2016

DARPA builds pop-up liquid cooled data center in 29 hours

Posted by in categories: robotics/AI, security

Got visitors coming in 2 days to check out your IT operations and need a data center popped up quickly to show off in front of the potential customers; well, now you can do it in 29 hours.


Defense team sets up AI-based security for the Cyber Grand Challenge.

Continue reading “DARPA builds pop-up liquid cooled data center in 29 hours” »

Aug 10, 2016

Quantum computing and cryptocurrencies: Are Steemit and bitcoin safe?

Posted by in categories: bitcoin, computing, cryptocurrencies, encryption, quantum physics, security

Article repeats a lot of the knowns on QC such as bit v. Qubit; and finally provides some good info on pros and cons of Bitcoin and Lamport signatures technique with QC. However, the author didn’t seem to mention any of the work that D-Wave for example is doing with Block chaining. Also, I saw no mention of the work by Oxford on the logic gate which improve both the information processing performance and the security of information transmissions.


In a classical computer bits are used that can either be 0 or 1. In a quantum computer these bits are replaced with Qubits (quantum bits). These Qubits can be 0 or 1, or both at the same time. This is caused by a phenomenon in the quantum realm called superposition. At scales the size of an atom and small molecules, the spin of particles is not determined until it is observed. A pair of Qubits can be in any quantum superposition of 4 states, and three Qubits in any superposition of 8 states. In general, a quantum computer with n Qubits can be in a superposition of up to 2^n different states simultaneously (this compares to a normal computer that can only be in one of these 2^n states at any one time). Because of this, a quantum computer is able to perform computations at the same time, while classical computers perform computations one at a time.

Continue reading “Quantum computing and cryptocurrencies: Are Steemit and bitcoin safe?” »

Aug 9, 2016

Can the Bioweapons Convention Survive Crispr?

Posted by in categories: biotech/medical, genetics, security

Crispr is a biotechnology that’s making genetic editing easier, cheaper, and far more accessible, but it has also been called a major security threat. Do such advances in biotechnology make the bioweapons convention obsolete?

Read more

Aug 8, 2016

Artificial Intelligence Just Changed the Future of Information Security

Posted by in categories: computing, robotics/AI, security

LAS VEGAS, Nev. — Mayhem ruled the day when seven AIs clashed here last week — a bot named Mayhem that, along with its competitors, proved that machines can now quickly find many types of security vulnerabilities hiding in vast amounts of code.

Sponsored by the Defense Advanced Research Projects Agency, or DARPA, the first-of-its-kind contest sought to explore how artificial intelligence and automation might help find security and design flaws that bad actors use to penetrate computer networks and steal data.

Mayhem, built by the For All Secure team out of Carnegie Mellon University, so outclassed its competition that it won even though it was inoperable for about half of the contest’s 96 270-second rounds. Mayhem pivoted between two autonomous methods of finding bugs and developing ways to exploit them.

Continue reading “Artificial Intelligence Just Changed the Future of Information Security” »

Aug 8, 2016

Artificial Intelligence Just Changed the Future of Information Security – Defense One

Posted by in categories: computing, quantum physics, robotics/AI, security

I will like to see how this stacks against China’s Quantum net, QC platform, AI, and hackers in the future. Not sold at this point until we truly have a QC infrastructure in place.


At DARPA’s Cyber Grand Challenge, bots showed off their ability to help a world wallowing in vulnerable code.

LAS VEGAS, Nev. — Mayhem ruled the day when seven AIs clashed here last week — a bot named Mayhem that, along with its competitors, proved that machines can now quickly find many types of security vulnerabilities hiding in vast amounts of code.

Continue reading “Artificial Intelligence Just Changed the Future of Information Security – Defense One” »