Blog

Archive for the ‘internet’ category: Page 264

Mar 21, 2017

A New Type of Li-Fi Has Reportedly Cracked 40 Gbps, 100 Times Faster Than the Best Wi-Fi

Posted by in category: internet

If you’re frustrated with slow wi-fi, you might be one of the many people eagerly awaiting the commercialisation of li-fi (or light-based wi-fi), which promises to be up to 100 times faster than the connections we use today.

Most li-fi systems rely on transmitting data via LED bulbs, which means there are some limitations to how easily the technology could be applied to systems outside the lab. But researchers have come up with a new type of li-fi that uses infrared light instead, and it’s reportedly already cracked 40 gigabits per second (gbps) in early testing.

For those who missed the li-fi hype, the communications system was first invented in 2011, based on the idea of transmitting data via the imperceptible flickering of LED light — think morse code happening so fast, it’s invisible to the human eye.

Continue reading “A New Type of Li-Fi Has Reportedly Cracked 40 Gbps, 100 Times Faster Than the Best Wi-Fi” »

Mar 20, 2017

SpaceX plans global ‘space internet’ | KurzweilAI

Posted by in categories: Elon Musk, internet, space

“SpaceX has applied to the FCC to launch 11,943 satellites into low-Earth orbit, providing “ubiquitous high-bandwidth (up to 1Gbps per user, once fully deployed) broadband services for consumers and businesses in the U.S. and globally,” according to FCC applications.”

Read more

Mar 17, 2017

Service Provider on Twitter

Posted by in categories: business, internet

Get ready for leaping toward next G of networking.


“5G-ready networks stand to reap billions in new business opportunities. Tweet #CiscoMWC to.

Read more

Mar 14, 2017

Your brain is unique – here’s how it could be used as the ultimate security password

Posted by in categories: finance, internet, mobile phones, neuroscience, privacy, security

Biometrics – technology that can recognise individuals based on physical and behavioural traits such as their faces, voices or fingerprints – are becoming increasingly important to combat financial fraud and security threats. This is because traditional approaches, such as those based on PIN numbers or passwords, are proving too easily compromised. For example, Barclays has introduced TouchID, whereby customers can log onto internet banking using fingerprint scanners on mobile phones.

However, this is not foolproof either – it is possible to forge such biometrics. Fingers can after all be chopped off and placed by impostors to gain fraudulent access. It has also been shown that prints lifted from glass using cellophane tape can be used with gelatine to create fake prints. So there is a real need to come up with more advanced biometrics that are difficult or impossible to forge. And a promising alternative is the brain.

Emerging biometric technology based on the electrical activity of the brain have indeed shown potential to be fraud resistant. Over the years, a number of research studies have found that “brainprints” (readings of how the brain reacts to certain words or tasks) are unique to individuals as each person’s brain is wired to think differently. In fact, the brain can be used to identify someone from a pool of 102 users with more than 98% accuracy at the moment, which is very close to that of fingerprints (99.8% accuracy).

Read more

Mar 11, 2017

Artificial intelligence given priority development status

Posted by in categories: internet, robotics/AI

“We will implement a comprehensive plan to boost strategic emerging industries,” said Premier Li Keqiang in his delivery at the annual parliamentary session in Beijing over the weekend.

“We will accelerate research & development (R&D) on, and the commercialisation of new materials, artificial intelligence (AI), integrated circuits, bio-pharmacy, 5G mobile communications, and other technologies.”


One analyst now projecting industry in China to grow by more than 50 per cent in value to US$5.5 billion by 2018.

Continue reading “Artificial intelligence given priority development status” »

Mar 7, 2017

IBM Is Rolling Out the World’s First Universal ‘Quantum Computing’ Service

Posted by in categories: computing, internet, quantum physics

IBM esta anunciando que estão desenvolvendo um sistema universal de “computação qu ntica”

O serviço será chamado IBM Q, e ele dará às pessoas acesso ao seu computador qu ntico de estágio inicial pela internet para usar como desejar — por uma taxa.

O grande elefante na sala é que, por enquanto, o computador qu ntico da IBM só funciona com cinco qubits, então não é muito mais rápido (se houver mais rápido) do que um computador convencional.

Continue reading “IBM Is Rolling Out the World’s First Universal ‘Quantum Computing’ Service” »

Mar 6, 2017

Hard drives of the future could be made of DNA

Posted by in categories: biotech/medical, computing, internet, mathematics

Our data-driven society is churning out more information than traditional storage technology can handle, so scientists are looking for a solution in Nature’s hard drive: DNA. A pair of researchers at Columbia University and the New York Genome Center recently wrote a full computer operating system, an 1895 French film, an Amazon gift card and other files into DNA strands and retrieved them without errors, according to a study published in the latest edition of Science.

There are several advantages to using DNA. It’s a lot smaller than traditional media; a single gram can fit 215,000 times more data than a one terabyte hard drive, The Atlantic notes. It’s also incredibly durable. Scientists are using DNA thousands of years old to de-extinct wooly mammoths, for example. But, until now, they’ve only unlocked a fraction of its storage capacity. Study coauthors Yaniv Erlich and Dina Zielinski were able to fit the theoretical maximum amount of information per nucleotide using a new method inspired by how movies stream across the internet.

“We mapped the bits of the files to DNA nucleotides. Then, we synthesized these nucleotides and stored the molecules in a test-tube,” Erlich explained in an interview with ResearchGate. “To retrieve the information, we sequenced the molecules. This is the basic process. To pack the information, we devised a strategy—called DNA Fountain—that uses mathematical concepts from coding theory. It was this strategy that allowed us to achieve optimal packing, which was the most challenging aspect of the study.”

Continue reading “Hard drives of the future could be made of DNA” »

Mar 6, 2017

LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED

Posted by in categories: cybercrime/malcode, drones, encryption, internet, mobile phones

Abstract: In this paper we present a method which allows attackers to covertly leak data from isolated, air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which exists in most of today’s desktop PCs, laptops and servers. We show that a malware can indirectly control the HDD LED, turning it on and off rapidly (up to 5800 blinks per second) — a rate that exceeds the visual perception capabilities of humans. Sensitive information can be encoded and leaked over the LED signals, which can then be received remotely by different kinds of cameras and light sensors. Compared to other LED methods, our method is unique, because it is also covert — the HDD activity LED routinely flickers frequently, and therefore the user may not be suspicious to changes in its activity. We discuss attack scenarios and present the necessary technical background regarding the HDD LED and its hardware control. We also present various data modulation methods and describe the implementation of a user-level malware, that doesn’t require a kernel component. During the evaluation, we examine the physical characteristics of different colored HDD LEDs (red, blue, and white) and tested different types of receivers: remote cameras, extreme cameras, security cameras, smartphone cameras, drone cameras, and optical sensors. Finally, we discuss hardware and software countermeasures for such a threat. Our experiment shows that sensitive data can be successfully leaked from air-gapped computers via the HDD LED at a maximum bit rate of 4000 bits per second, depending on the type of receiver and its distance from the transmitter. Notably, this speed is 10 times faster than the existing optical covert channels for air-gapped computers. These rates allow fast exfiltration of encryption keys, keystroke logging, and text and binary files.

Read more

Mar 3, 2017

What Fraction of Bitcoin Value is Driven by Speculators?

Posted by in categories: bitcoin, cryptocurrencies, economics, internet

At Quora, I occasionally play, “Ask the expert”. Several hundred of my Quora answers are linked here. Today, I was asked “How much of Bitcoin’s value is driven by speculation”. This is my answer…


This is a great question! While the value of any commodity is determined by supply and demand, speculation is one component of demand. Another is the unique utility value inherent in a product or process. This is sometimes called ‘intrinsic value’.

It’s ironic that when a high fraction of value is driven by speculation, short-term value becomes volatile and long-term value becomes less certain—and less likely to produce returns for those same speculators.

Editor’s Note: In the past few weeks, a significant spike in Bitcoin’s value and trading volume relates to a pending regulatory decision expected at the end of next week. This activity is certainly driven by speculation. But for this article, I am considering periods in which the demands of individual events are less clear.

Continue reading “What Fraction of Bitcoin Value is Driven by Speculators?” »

Mar 1, 2017

Mathematician breaks down how to defend against quantum computing attacks

Posted by in categories: computing, encryption, internet, mathematics, quantum physics

The encryption codes that safeguard internet data today won’t be secure forever.

Future quantum computers may have the and algorithms to crack them.

Nathan Hamlin, instructor and director of the WSU Math Learning Center, is helping to prepare for this eventuality.

Read more