Blog

Archive for the ‘security’ category: Page 77

Nov 20, 2020

Sunflower Labs Home Security Drone

Posted by in categories: drones, security

You can now protect your home with this security drone! 😃


This security system deploys a drone when it senses intruders.

Nov 18, 2020

Expect the Unexpected: Frontiers of Mathematics, Computation, Systems and Design

Posted by in categories: government, mathematics, robotics/AI, security, surveillance

AI designed to be aware of it’s own competence.


Ira Pastor, ideaXme life sciences ambassador interviews Dr. Jiangying Zhou, DARPA program manager in the Defense Sciences Office, USA.

Continue reading “Expect the Unexpected: Frontiers of Mathematics, Computation, Systems and Design” »

Nov 14, 2020

Federal utility fined $900K for nuclear violations, coverup

Posted by in categories: nuclear energy, security

Federal regulators have fined the nation’s largest public utility more than $900,000 for violating procedures during the startup of a Tennessee nuclear reactor and subsequently misleading investigators. Two managers and a plant operator who worked at the Tennessee Valley Authority’s Watts Barr Nuclear Plant in Spring City were also issued violations by the Nuclear Regulatory Commission.

Howard Hall, director of the University of Tennessee’s Institute for Nuclear Security, said the notice of violation to TVA points to “a systemic problem in management.”

“As someone who has worked in this field essentially my entire life, I would have been appalled to receive such a letter,” Hall said.

Nov 8, 2020

Automated Technology Allows Unparalleled Space Exploration from Moon, to Asteroids, and Beyond

Posted by in categories: mapping, security, space

When landing Apollo 11 in 1969, astronauts looked out the window for distinguishing features that they recognized from maps of the Moon and were able to steer the lander to avoid a disastrous touchdown on top of a rocky area. Now, 50 years later, the process can be automated. Distinguishing features, like known craters, boulders, or other unique surface characteristics, provide insight into surface hazards to help avoid them while landing.

NASA scientists and engineers are maturing technology for navigating and landing on planetary bodies by analyzing images during descent – a process called terrain relative navigation (TRN). This optical navigation technology is included on NASA’s newest Mars rover, Perseverance, which will test TRN when it lands on the Red Planet in 2021, paving the way for future crewed missions to the Moon and beyond. TRN was also being used during NASA’s recent Origins, Spectral Interpretation, Resources Identification, Security, Regolith Explorer (OSIRIS-REx) mission Touch-and-Go (TAG) event to collect samples of the asteroid Bennu in order to better understand the characteristics and movement of asteroids.

Since reaching Bennu in 2018, the OSIRIS-REx spacecraft has mapped and studied its surface, including its topography and lighting conditions, in preparation for TAG. Nightingale crater was chosen from four candidate sites based on its great amount of sampleable material and accessibility for the spacecraft.

Oct 30, 2020

Google’s Project Zero discloses Windows 0day that’s been under active exploit

Posted by in category: security

Security flaw lets attackers escape sandboxes designed to contain malicious code.

Oct 30, 2020

Think Big, Move Fast, Build Capacity and Resilience: Disaster Management

Posted by in categories: climatology, health, robotics/AI, security

The future of disaster management, using artificial intelligence, machine learning, and a bit of Waffle House and Starbucks 🙂


Ira Pastor, ideaXme life sciences ambassador interviews Craig Fugate Chief Emergency Management Officer of One Concern and former administrator of the Federal Emergency Management Agency (FEMA).

Continue reading “Think Big, Move Fast, Build Capacity and Resilience: Disaster Management” »

Oct 28, 2020

Advanced Technology: Science Fiction to Science Fact and Encouraging a Culture of Responsibility

Posted by in categories: bioengineering, biotech/medical, life extension, security

Human body bio-factories of tommorow for organ and tissue replacement.


Ira Pastor, ideaXme life sciences ambassador interviews Dr Alexander Titus Chief Strategy Officer (CSO) at the Advanced Regenerative Manufacturing Institute (ARMI).

Continue reading “Advanced Technology: Science Fiction to Science Fact and Encouraging a Culture of Responsibility” »

Oct 26, 2020

In New Milestone, Physicists Store And Transport Light Using Quantum Memory

Posted by in categories: computing, internet, mapping, particle physics, quantum physics, security

We stored the light by putting it in a suitcase so to speak, only that in our case the suitcase was made of a cloud of cold atoms,” says physicist Patrick Windpassinger from Mainz University in Germany. “We moved this suitcase over a short distance and then took the light out again.


The storage and transfer of information is a fundamental part of any computing system, and quantum computing systems are no different – if we’re going to benefit from the speed and security of quantum computers and a quantum internet, then we need to figure out how to shift quantum data around.

One of the ways scientists are approaching this is through optical quantum memory, or using light to store data as maps of particle states, and a new study reports on what researchers are calling a milestone in the field: the successful storage and transfer of light using quantum memory.

Continue reading “In New Milestone, Physicists Store And Transport Light Using Quantum Memory” »

Oct 24, 2020

New Chrome 0-day Under Active Attacks – Update Your Browser Now

Posted by in categories: computing, security

Attention readers, if you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update your web browsing software immediately to the latest version Google released earlier today.

Google released Chrome version 86.0.4240.111 today to patch several security high-severity issues, including a zero-day vulnerability that has been exploited in the wild by attackers to hijack targeted computers.

Tracked as CVE-2020–15999, the actively exploited vulnerability is a type of memory-corruption flaw called heap buffer overflow in Freetype, a popular open source software development library for rendering fonts that comes packaged with Chrome.

Oct 17, 2020

‘Classified knots’: Researchers create optical framed knots to encode information

Posted by in categories: encryption, quantum physics, security

In a world first, researchers from the University of Ottawa in collaboration with Israeli scientists have been able to create optical framed knots in the laboratory that could potentially be applied in modern technologies. Their work opens the door to new methods of distributing secret cryptographic keys—used to encrypt and decrypt data, ensure secure communication and protect private information. The group recently published their findings in Nature Communications.

“This is fundamentally important, in particular from a topology-focused perspective, since framed knots provide a platform for topological quantum computations,” explained senior author, Professor Ebrahim Karimi, Canada Research Chair in Structured Light at the University of Ottawa.

“In addition, we used these non-trivial optical structures as information carriers and developed a security protocol for classical communication where information is encoded within these framed knots.”

Page 77 of 146First7475767778798081Last