Browsed by
Category: Articles

Robo-Taxis

Robo-Taxis

The Intel giant chip takes over Moovit, an Israeli application developer that will remain an independent team, and its data will be integrated with Mobileye resources. Intel invests in robo-taxis, with a value of around $ 0.9 billion. Intel hopes that the first such taxis will appear on the streets in 2022; they can be seen in France, Israel, and South Korea. In practice, they can be ordered through an application like Uber. Moovit is a project with which Intel has been associated for several years. Intel seized the opportunity, and the coronavirus crisis led Moovit to search for cash for the project. In a short time, the contract was negotiated, entirely online.

The device for blocking satellite communications

The device for blocking satellite communications

Impressive Engineering has reported a remote device for blocking satellite communications, making temporarily hostile satellites in orbit useless. This device allows you to turn off satellites from the Earth’s surface. So far, no one has boasted of space weapons, apparently, since 2017, more than 13 systems can work. Experts say that technology does not damage satellites. Still, it can be a dangerous weapon, because it can cut off soldiers on the mission from the communication network or neutralize enemy missile warning systems. I wonder how enormous the consequences can be with the disabling of satellites from the Earth; probably shortly, we will find out. As it usually happens.

BRUIE,

BRUIE,

BRUIE, an advanced robot that can resemble a toy, is about to set out to explore space. The machine is adapted to navigate the icy oceans. However, it does not stick to the ice layer on the surface but sticks to the bottom. The robot is simply two wheels with a diameter of 25 cm connected by an axis, which NASA wants to equip with advanced equipment. Antarctica and Arctic testing have been completed to check the operation of BRUIE under the rough conditions it encounters during the mission. There is no exact date when the machine will go to space exploration, but Europe and the moon of Jupiter are in the crosshairs. Scientists believe that there is a high probability of potential life, and a free rover can traverse the ice crust and explore a new world.

https://lnkd.in/dZKS2rm

Aspherical microlenses

Aspherical microlenses

Researchers at the Faculty of Physics of the University of Warsaw surprised us by designing and creating with the help of a unique 3D laser printer on a scale – tiny lenses. Their size is smaller than human hair, and they will play invaluable help in optical measurements of semiconductor structures. Lenses can observe light from samples containing, for example, quantum dots or, recently, prevalent, atomic thin two-dimensional materials. These include molybdenum dioxide and tungsten dioxide, which have a graphene-like structure. The microlenses surface is designed so that the light emitted from the sample is formed into a beam of photons with low divergence, which beam can quickly be sent to research and measuring equipment. This is a step to replace the expensive and bulky size microscope lens.

https://lnkd.in/dHD2tu8

A Brief History of Cybersecurity

A Brief History of Cybersecurity

In today’s era, cybersecurity is essential to us. However, half a century ago, Internet 3security was not in the range. The most important thing was for the new package-based scheme to work. Protection in a harmonious team was not needed; at that time, no one had access to the network. Currently, the ubiquitous access to the Internet has caused a massive increase in the number of cyberattacks. In retrospect, it can be seen that ignoring security was a huge drawback.

https://www.cybersecurity-insiders.com/a-brief-history-of-cybersecurity/

Dron as a bat.

Dron as a bat.

Researchers Mireille “Mimi” Boutin from Purdue University and Gregor Kemper from Technical University have developed a system that allows drones to orient themselves in space. The drone will be able to measure the distance separating it from various objects through echo generations, i.e., like bat-like echolocation. The generated sound was recorded and corresponded to the distance from the obstacle. So far, researchers can enforce the drone’s capabilities only when it is stationary, but they are already working on using this technology on the fly. Drones would not be dependent on cameras and GPS signals, so they could help search for night patrols, especially in places where there is no light.

Introducing The Amazing Compact Disc | 1982 | Retro vintage 80s technology

Introducing The Amazing Compact Disc | 1982 | Retro vintage 80s technology

Remember the time when compact disk appeared for the first time; it was precisely March 8, 1979. CDs once conquered the world by storm. Floppy disks or cassettes have been almost entirely displaced, and gramophone records survived only thanks to audiophiles willing to sacrifice comfort and durability in favor of musical nuances. Capacious, resistant, and space-saving – compact discs have been simplified and ubiquitous for a long time. However, the development of the Internet, the ability to store data in the cloud and streaming services were the next step in data storage, thus limiting the use of optical disks. It may seem that CD shared the fate of floppy disks and cassettes, but not. Although we use cloud computing, SSDs, and HDDs, compact discs still used and developed because they offer benefits unavailable for other solutions.

Neuromorphic

Neuromorphic

Neuromorphic calculations are new and utterly different from the previous approach to computer architecture. The main area of ​​the application here is neuroscience, whose operation is less associated with a traditional computer, and more with the action of the human brain. The most extensive neuromorphic computing system developed to date has been built by Intel, whose system is capable of recognizing cloud odors where the costs and other migration traps of Pohoiki Springs are hidden. Loihi processor, just like the brain, can handle demanding tasks up to 1000 times faster and 10,000 times more efficiently than conventional processors. Pohoiki Springs is a big step towards an architecture that allows you to assess the potential for solving problems with AI, but also a wide range of difficult tasks in calculations. Intel and INRC researchers have demonstrated the ability of Loihi to recognize gestures in real-time, read braille using innovative artificial leather, orientate according to learned landmarks, or learn fragrances. In essence, these possibilities are due to the use of tens of milliwatts of power. The values are minimal compared to computers with conventional architecture.

Intel chipsets

Intel chipsets

For the last five years, Intel chipsets have a hole through which cybercriminals can easily bypass security and easily install malicious code – keylogger. A severe problem is not being able to patch the gap. The error is encoded in ROM, where the boot data is downloaded. It occurs at the hardware level; it cannot be removed. Unfortunately, this can lead to an imperceptible attack and infect millions of devices. However, there is good news; the attacker’s capabilities are minimal, even if he must have access to a computer or a local network. Additional security is the cryptographic key inside the programmable OTP memory. However, the encryption key is still vulnerable. The situation is dangerous, espionage is particularly sensitive. The problem is that the ROM allows you to take control before you secure the hardware with a cryptographic key, but that the error is irreparable seems only a matter of time to get that key. The error is in Intel chipsets sold for five years. The latest ten chipsets have improved. The company admits that it is impossible to repair the hole programmatically. A few days ago, a patch was released that solves the problem, but what counts is the time during which all potential attacks must be quarantined.

Fool the hackers

Fool the hackers

Scientists from Texas during the Computer Security Applications Conference last year suggested a new method of fighting hackers. According to them, instead of blocking ourselves, we should be open to their actions. They called the new strategy DEEP-Dig under the guise of a legitimate-looking site, you can learn tactics, then you could use hacker grips for training or recognize and stop future attacks. DEEP-Dig will allow criminals to follow and attract them to a legitimate site. During the hack, the attacker would have the impression that he would be able to break the system in a moment. Kevin Hamlen convinced that when the attacker tries to dodge the defense system, we have the opportunity to learn extraordinary information or how hackers try to cover their tracks. The fear of an attack on our privacy is enormous, and artificial intelligence systems lack the knowledge to capture intruders, this new approach is to help provide data for self-learning systems. The better the data, the higher the ability to detect attacks.