Blog

Page 11461

Feb 4, 2016

Scientists Discover How the Human Brain Folds

Posted by in category: neuroscience

Scientists were able to study brain growth using a 3D gel model in order to see how the human brain gets its folds.

New research shows that our brains are likely folded because, as they grow, a large amount of volume has to fit in a small space (AKA, our skulls). This compression is actually beneficial, the folds reduce the length of neuronal wiring, improving cognitive function.

Researchers at the Harvard John A. Paulson School of Engineering and Applied Sciences teamed up with scientists in Finland and France to find out more about the folding process.

Read more

Feb 4, 2016

HoloLens Could Reinvent How We Watch Football

Posted by in category: augmented reality

HoloLens is about to change the way we watch sports. http://voc.tv/14JQHoo

Read more

Feb 4, 2016

A designer created a projector that completely changes faces

Posted by in category: futurism

Read more

Feb 4, 2016

DNA used to assemble nanoparticles into a copy of the crystalline structure of diamond

Posted by in categories: biotech/medical, computing, materials, nanotechnology, particle physics

Building building diamond lattices through DNA.


Using bundled strands of DNA to build Tinkertoy-like tetrahedral cages, scientists at the U.S. Department of Energy’s Brookhaven National Laboratory have devised a way to trap and arrange nanoparticles in a way that mimics the crystalline structure of diamond. The achievement of this complex yet elegant arrangement, as described in a paper published February 5, 2016, in Science, may open a path to new materials that take advantage of the optical and mechanical properties of this crystalline structure for applications such as optical transistors, color-changing materials, and lightweight yet tough materials.

“We solved a 25-year challenge in building diamond lattices in a rational way via self-assembly,” said Oleg Gang, a physicist who led this research at the Center for Functional Nanomaterials (CFN) at Brookhaven Lab in collaboration with scientists from Stony Brook University, Wesleyan University, and Nagoya University in Japan.

Continue reading “DNA used to assemble nanoparticles into a copy of the crystalline structure of diamond” »

Feb 4, 2016

MIT engineers have developed a new kind of RFID chip that’s nearly impossible to hack

Posted by in categories: cybercrime/malcode, materials, security

Non-hackable RFIDs


You might not realize it, but radio frequency identification (RFID) tech is everywhere these days. From the cards in your wallet, to inventory control in warehouses, it’s the technology that works behind the scenes to power the world around you. RFID has brought efficiency to complicated industries and makes our tiny devices and everyday carry items speak to each other. But RFID technology has also been very vulnerable to security attacks and information hackers – until now. A team of researchers from MIT and Texas Instruments have developed a new kind of RFID chip that they believe is impossible to hack.

The new RFID chip is made of ferroelectric crystals, which are material made up of molecules arranged in a lattice pattern across three dimensions. Thanks to this unique structure, when you apply electricity to the lattice, each cell can be polarized as either positive or negative, representing the values of a bit of information. Because the cells retain their polarization when the electric field is removed, the chips can store data even when they’re powered off. Texas Instruments developed a series of 3.3-volt capacitors for the chip’s energy source, and 1.5-volt cells for data storage.

Continue reading “MIT engineers have developed a new kind of RFID chip that’s nearly impossible to hack” »

Feb 4, 2016

A Deep Learning AI Chip for Your Phone

Posted by in categories: computing, mobile phones, robotics/AI

AI Chip for the phone — the new MIT chip has 168 processing engines with each engine having it’s own dedicated memory bank.


A chip designed to run powerful neural networks for image analysis uses one-tenth the energy a mobile GPU would.

Read more

Feb 4, 2016

U.S. To Rework Arms Control Rule on Exporting Hacker Tools

Posted by in categories: cybercrime/malcode, security

US Hacker Tools treated like weapons in US arms deals with other countries — why not; the true war is really in Cyber.


The government is rewriting a proposal under arms control rules from 20 years ago to make it simpler to export tools related to surveillance and hacking software, since they are used for network security.

Read more

Feb 4, 2016

DOT&E: Cyber Vulnerabilities Plague Battlefield Comms

Posted by in categories: cybercrime/malcode, military

Cyber is still a challenge for soldiers on the battlefield.


Editor’s Note: This story has been updated to include comment from an industry official.

WASHINGTON — Cyber vulnerabilities continue to plague the Army’s battlefield communications, according to the Pentagon’s top weapons tester, while the service works to harden its network against cyber attacks.

Continue reading “DOT&E: Cyber Vulnerabilities Plague Battlefield Comms” »

Feb 4, 2016

Are you covered? Emerging issues for health care providers under cyber risk insurance

Posted by in categories: biotech/medical, health, law, policy, security

Tough to be a doctor these days — Could be bad news for Providers with limited or no Cyber Risk Coverage.


Providers are focusing on cybersecurity with increased urgency. Cyberattacks on health-care organizations reached an all-time high in 2015 and aren’t expected to slow down in 2016, Harry Greenspun, director for Deloitte’s Center for Health Solutions, told Bloomberg BNA. One element of a comprehensive strategy to address data security is customized cyber risk insurance. Recent case law supports standing for class action litigants alleging future injuries, which may not be covered by some policy forms. We urge providers to review their cyber risk coverage with the increasing risks and this new case law in mind.

Specifically, it is critical that cyber risk insurance is designed to both: adequately mitigate future harm to those whose private information is compromised as a result of a data breach; and satisfy the full array of damages sought by such third parties, including damages for future injuries resulting from the anticipated improper use of data. These considerations are increasingly important because the policies available in today’s market are not standardized. While many absorb some of the costs associated with notification and fraud monitoring, existing forms may not protect against damages sought for susceptibility to identity theft.

Continue reading “Are you covered? Emerging issues for health care providers under cyber risk insurance” »

Feb 4, 2016

Samsung thinks giant screens on the backs of trucks will make highways safer

Posted by in category: futurism

Great idea until that ADHD kicks in.


What do you think of this idea?

Read more