Monday, 1 August 2016

thumbnail

Bacteria that turn sewage into clean water – and electricity


 Personal water treatment plants could soon be recycling our waste water and producing energy on the side.
Last month, Boston-based Cambrian Innovation began field tests of what’s known as a microbial fuel cell at the Naval Surface Warfare Center in Maryland. Called BioVolt, in one day it can convert 2250 litres of sewage into enough clean water for at least 15 people. Not only that, it generates the electricity to power itself – plus a bit left over.
BioVolt uses strains of Geobacter and another microbe called Shewanella oneidensis to process the sludge. Its proprietary mix of organisms has one key advantage – the bacteria liberate some electrons as they respire, effectively turning the whole set-up into a battery. This has the added benefit of slowing bacterial growth, so that at the end of the process you have electricity and no microbe cake.

Friday, 22 July 2016

thumbnail

New Camera Is the Size of a Grain of Salt

 New Camera Is the Size of a Grain of Salt: Smart Dust Is Coming 

AddThis Sharing Buttons
Miniaturization is one of the most world-shaking trends of the last several decades. Computer chips now have features measured in billionths of a meter. Sensors that once weighed kilograms fit inside your smartphone. But it doesn't end there.
Researchers are aiming to take sensors smaller—much smaller.
In a new University of Stuttgart paper published in Nature Photonics, scientists describe tiny 3D printed lenses and show how they can take super sharp images. Each lens is 120 millionths of a meter in diameter—roughly the size of a grain of table salt—and because they're 3D printed in one piece, complexity is no barrier. Any lens configuration that can be designed on a computer can be printed and used.
This allows for a variety of designs to be tested to achieve the finest quality images.
According to the paper, the new method not only demonstrates high-quality micro-lenses can be 3D printed, but it also solves roadblocks to current manufacturing methods. These include limitations on how small you can go, failure to combine multiple elements, surface design restrictions, and alignment difficulties.
thumbnail

Artificial intelligence

Artificial intelligence


There is a common saying in the artificial-intelligence community: “AI is whatever hasn’t been done yet.” They call this the “AI effect.” Skeptics discount the behavior of an artificial-intelligence program by arguing that, rather than being real intelligence, it is just brute force computing and algorithms.
There is merit to the criticism. Even though computers have beaten chess masters and Jeopardy players and learned to talk to us and drive cars, Siri and Cortana are still imperfect and infuriating.
But that is about to change — so that even the skeptics will say that AI has arrived. There have been major advances in “deep learning” neural networks, which learn by ingesting large amounts of data: IBM has taught its AI system, Watson, everything from cooking, to finance, to medicine and Facebook. Google, and Microsoft have made great strides in face recognition and human-like speech systems. AI-based face recognition, for example, has almost reached human capability. And IBM Watson can diagnose certain cancers better than any human doctor can.
Fortunately, we don’t need to worry about superhuman AI yet; that is still a decade or two away.
thumbnail

How Drone helps find a man suffering from heart attack


 A new colleague was Iowa's first responders sight when searching for missing boaters Wednesday night.

On the East Fork of the Des Moines River, a 20-person team was searching for a grandfather and granddaughter who were stranded in a logjam . David Penton, emergency management coordinator for Kossuth County, could faintly hear the cries of the missing persons, but the setting sun was making it more difficult to see them amid the thickly wooded riverbank.
So Penton called a colleague and had him rush to the scene with a drone.
Within three minutes of takeoff, they'd found the duo by watching the live stream from the DJI Phantom's camera. The drone then hovered overhead so that the first responders could use its location to guide them to the grandfather and granddaughter.
According to Penton, he said he expected the victims would have been found without the drone, but using it allowed them to find them faster. Once discovered, the man fell to his knees as he was suffering from a heart attack.
"Without the help of that drone, time could've been an issue for him," Penton said.

Saturday, 2 July 2016

thumbnail

Android Hacking group making $500,000 per day

Own an Android smartphone?

Hackers can secretly install malicious apps, games, and pop-up adverts on your smartphone remotely in order to make large sums of money.
Cheetah Mobile have uncovered one of the world's largest and most prolific Trojan families, infecting millions of Android devices.
Dubbed Hummer, this notorious mobile trojan stealthily installs malicious apps, games, or even porn apps onto victim's phones and yields its creators more than $500,000 (£375,252) on a daily basis.
"This Trojan continually pops up ads on victims' phones, which is extremely annoying," researchers wrote in a blog post. "It also pushes mobile phone games and silently installs porn applications in the background. Unwanted apps appear on these devices, and they are re-installed shortly after users uninstall them."
Even after the number of phones infected has declined, Hummer is still infecting nearly 1 Million new devices per day, making it the most widespread trojan family in the world.
Every time Hummer installs a new app on the infected devices, it's developers make 50 cents. Therefore, the group behind this Trojan is believed to be making more than half a million dollars (over $500,000) daily.
...and over $15 Million per month.
Here's How Hummer Work:
Once a device is infected with Hummer, the Trojan proceeds to root the phone to gain administrator privileges, which allowed it to discreetly install unwanted apps, games, porn apps as well as malware in the background.

These apps and malware end up consuming large amounts of network traffic, potentially affecting the victims with large bills from their Internet providers.
"In several hours, the trojan accessed the network over 10,000 times and downloaded over 200 APKs, consuming 2 GB of network traffic," the researchers noted.
Hummer is almost Impossible to Uninstall
The bad news for affected Android users is that Hummer is extremely difficult if not impossible to get rid of, because the Trojan takes control of the phone at admin level, making it impossible for traditional antivirus tools to uninstall Hummer.
The dangerous part: It is impossible to delete the Trojan through a factory reset due to the fact Hummer comes equipped with up to 18 different separate rooting exploits that allow it to root itself on a phone, the researchers said.
Recently, Trend Micro researchers also detected a similar threat known as Godless that came with Android rooting exploits, affecting 90 percent of all Android devices available in the market today.
Hummer spreads itself using a different number of domain names and third-party app stores, tricking users into downloading malicious apps or fake versions of popular apps like Facebook or Twitter.
The researchers claim to have traced the source of the Trojan family to an "underground internet industry chain" in China, based on an email address linked to the domain names used by the malware.

Saturday, 18 June 2016

thumbnail

Apple Ordered To Hold on iPhone 6 Sales In China for sometimes


hares in Apple drop after news of the order by an intellectual property tribunal, despite the firm winning a temporary reprieve.
10:09, UK,Saturday 18 June 2016
A sales assistant shows features of iOS 9 on an Apple iPhone 6 at an Apple reseller shop in Bangkok
Apple has been told to suspend sales of two versions of the iPhone 6 in Beijing because they are too similar to a competitor.
The order by an intellectual property tribunal said the iPhone 6 and 6 Plus infringed a design patent for the 100C model made by Shenzhen Beili, a small Chinese brand.
It was issued in May but reported this week by Chinese media.
Apple said it had been allowed to continue selling the devices for now after a Beijing court stayed the administrative order on appeal.
Shenzhen Beili 100 phone model. Pic: Vickmall.com
Shares in Apple fell 2.3% after the news emerged, contributing to a fall on the S&P 500 of 0.3% and a 0.9% drop for the Nasdaq. 
It is the latest setback for Apple in its second biggest market after regulators forced it to suspend the iBooks and iTunes Movies services in April.
Then in May, a court ruled a Chinese company would be allowed to use the iPhone trademark on bags, wallets and other leather goods.
thumbnail

McAfee : New Mobile App Collusion Threats


Delayed Software Updates Enable Cybercriminals to Exploit Mobile Apps; Pinkslipbot Trojan Returns with New Capabilities


intel-security-logoNEWS HIGHLIGHTS
  • McAfee Labs identifies more than 5,000 versions of 21 consumer mobile apps containing colluding code capable of data exfiltration, file inspection, fake SMS messages, and other malicious activity
  • New strain of Pinkslipbot Trojan features anti-analysis and multi-layered encryption
  • New ransomware grew 24% quarter-over-quarter in Q1 2016
  • Threat researchers saw a 17% quarter-over-quarter increase in new mobile malware samples in Q1 2016
  • Mac malware spiked Q1 primarily due to an increase in VSearch adware
 Intel Security released its McAfee Labs Threats Report: June 2016, which explains the dynamics of mobile app collusion, where cybercriminals manipulate two or more apps to orchestrate attacks capable of exfiltrating user data, inspecting files, sending fake SMS messages, loading additional apps without user consent, and sending user location information to control servers. McAfee Labs has observed such behavior across more than 5,000 versions of 21 apps designed to provide useful user services such as mobile video streaming, health monitoring, and travel planning. Unfortunately, the failure of users to regularly implement essential software updates to these 21 mobile apps raises the possibility that older versions could be commandeered for malicious activity.
Widely considered a theoretical threat for many years, colluding mobile apps carry out harmful activity together by leveraging interapp communication capabilities common to mobile operating systems. These operating systems incorporate many techniques to isolate apps in sandboxes, restrict their capabilities, and control which permissions they have at a fairly granular level. Unfortunately, mobile platforms also include fully documented ways for apps to communicate with each other across sandbox boundaries. Working together, colluding apps can leverage these interapp communication capabilities for malicious purposes.
McAfee Labs has identified three types of threats that can result from mobile app collusion:
  • Information theft: 
  • Financial theft: 
  • Service misuse:
Mobile app collusion requires at least one app with permission to access the restricted information or service, one app without that permission but with access outside the device, and the capability to communicate with each other.
“Improved detection drives greater efforts at deception,” said Vincent Weafer, vice president of Intel Security’s McAfee Labs group. “It should not come as a surprise that adversaries have responded to mobile security efforts with new threats that attempt to hide in plain sight. Our goal is to make it increasingly harder for malicious apps to gain a foothold on our personal devices, developing smarter tools and techniques to detect colluding mobile apps.”
The McAfee Labs report discusses forward-looking research to create tools, initially used by threat researchers manually but eventually to be automated, to detect colluding mobile apps. Once identified, colluding apps may be blocked using mobile security technology. The report suggests a variety of user approaches to minimize mobile app collusion, including downloading mobile apps only from trusted sources, avoiding apps with embedded advertising, not “jailbreaking” mobile devices, and most importantly, always keeping operating system and app software up-to-date.

McAfee

Sunday, 14 February 2016

Friday, 12 February 2016

thumbnail

Gravitational waves bringing Einstin's understanding alive

 One tiny chirp confirms both general relativity and black hole science

thumbnail

32-Core CPUs From Intel and AMD. Is storming the computing world

 
If your CPU has only a single core, it's a dinosaur, a quad-core computing is now commonplace; you can even get laptop computers with four cores today. But the core war is just starting: Leadership in the CPU market will soon be decided by who has the most cores, not who has the fastest clock speed. 

What is it? With the gigahertz race largely abandoned, both AMD and Intel are trying to pack more cores onto a die in order to continue to improve processing power and aid with multitasking operations. Miniaturizing chips further will be key to fitting these cores and other components into a limited space. Intel will roll out 32-nanometer processors (down from today's 45nm chips) in 2009.
When is it coming? Intel has been very good about sticking to its road map. A six-core CPU based on the Itanium design should be out imminently, when Intel then shifts focus to a brand-new architecture called Nehalem, to be marketed as Core i7. Core i7 will feature up to eight cores, with eight-core systems available in 2009 or 2010. (And an eight-core AMD project called Montreal is reportedly on tap for 2009.)
After that, the timeline gets fuzzy. Intel reportedly canceled a 32-core project called Keifer, slated for 2010, possibly because of its complexity (the company won't confirm this, though). That many cores requires a new way of dealing with memory; apparently you can't have 32 brains pulling out of one central pool of RAM. But we still expect cores to proliferate when the kinks are ironed out: 16 cores by 2011 or 2012 is plausible (when transistors are predicted to drop again in size to 22nm), with 32 cores by 2013 or 2014 easily within reach. Intel says "hundreds" of cores may come even farther down the line.
thumbnail

Memristor can remember electrical states

http://image.slidesharecdn.com/memristor1-131121043444-phpapp02/95/memristor-3-638.jpg?cb=1385008821
 Memristor is microscopic component that can "remember" electrical states even when turned off. It's more like a flash storagebut far cheaper and faster. A theoretical concept since 1971, it has now been built in labs and is already starting to revolutionize everything we know about computing, possibly making flash memory, RAM, and even hard drives obsolete within a decade.
The memristor is just one of the incredible technological advances sending shock waves through the world of computing. Other innovations in the works are more down-to-earth, but they also carry watershed significance. From the technologies that finally make paperless offices a reality to those that deliver wireless power, these advances should make your humble PC a far different beast come the turn of the decade.

Thursday, 11 February 2016

thumbnail

Data-Driven Design Takes Center Stage


"If the theme of the 2000’s was “mass data capture”, 2016 and beyond will be “data driven design." Today, publicly traded companies radically redirect their vision based on inferences made from user data, and startups define their products, strategies and business plans based on publicly available datasets.

One of the industries most affected by the data revolution has been retail. Before this era, retailers had a unidirectional relationship with their customers. They identified new items that “would sell” and presented them to their customer through a crafted experience. Before data, this was almost entirely subjective. Data collation now enables a bidirectional relationship between retailers and their customers, yielding empirical metrics to corroborate subjective vision. We see obvious examples of this with Amazon, which uses a supervised machine learning algorithm (SMLA) platform to make recommendations. But it’s also in places you wouldn’t expect, like a Nordstrom department store, which uses customer smartphones to track behavior and shopping habits.

Ignoring data can have dramatic results. Data science, data design, and data strategy each serve as a necessary tool for product creation. They enable a dynamic relationship between designers and users, and a personalized, adaptive experience. Data driven design will fundamentally change the retail experience and the design of the products, catapulting companies to rich insights and sustainable growth."