But business challenges and technical problems remain.
Year: 2018
Sounds of Mars
Posted in space | Leave a Comment on Sounds of Mars
BREAKING: Humans have never before heard the sound of wind on Mars until now! Listen to #SoundsOfMars as recorded by NASA InSight as Martian winds swept over our lander. Best with headphones or a subwoofer. https://go.nasa.gov/2BWeong&h=AT2phR-fnwaC50oFKYLmQGoDEJ8_fVYSFdYpoRW66w7SsQE-6UyhKlQRCObhxc3pbLExNIlLjQprIqlAWATH2Vs0-OmcIHAtS-iM6kO5dEMhptgYswKy8cxW2GZyNCDIVEHPVRkrgo4tYeA9JivZKitxyLjhpZYtOzY7xoki8fXMfWhAfd9mNw
A new way to make arrays of nanofibers that gets its inspiration from polar bear fur, lotus leaves, and gecko feet could lead to coatings that are sticky, repellant, insulating, or light emitting.
“This is so removed from anything I’ve ever seen that I would have thought it was impossible,” says Joerg Lahann, a professor of chemical engineering at the University of Michigan and senior author of the paper, which appears in Science.
Polar bear hairs are structured to let light in while keeping heat from escaping. Water-repelling lotus leaves are coated with arrays of microscopic waxy tubules. And the nanoscale hairs on the bottoms of gravity-defying gecko feet get so close to other surfaces that atomic forces of attraction come into play.
Today, we want to highlight results from human trials in which stem cell transplants have been shown to reduce age-related frailty.
Age-related frailty and stem cell transplants
Currently, there are no specific approved therapies to address age-related frailty, which can cause elderly people to suffer potentially fatal falls and injuries. There has been considerable interest in stem cell therapies to combat frailty in recent years, and the results we will discuss today are from one of the more advanced human clinical trials exploring mesenchymal stem cell (MSC) transplants [1].
Tesla launched a new ‘Enhanced Anti-theft’ system as an aftermarket product last month and we now take a first look at one of the very first installations on a Model X.
There have been strings of Tesla thefts earlier this year that prompt the automaker to offer several new security features.
We reported on several Tesla vehicle thefts through relay attacks in Europe earlier this year.
The accelerating investment in artificial intelligence has vast implications for economic and cognitive development globally. However, AI is currently dominated by an oligopoly of centralized mega-corporations, who focus on the interests of their stakeholders. There is a now universal need for AI services by businesses who lack access to capital to develop their own AI services, and independent AI developers lack visibility and a source of revenue. This uneven playing field has a high potential to lead to inequitable circumstances with negative implications for humanity. Furthermore, the potential of AI is hindered by the lack of interoperability standards. The authors herein propose an alternative path for the development of AI: a distributed, decentralized, and democratized market for AIs run on distributed ledger technology. We describe the features and ethical advantages of such a system using SingularityNET, a watershed project being developed by Ben Goertzel and colleagues, as a case study. We argue that decentralizing AI opens the doors for a more equitable development of AI and AGIt will also create the infrastructure for coordinated action between AIs that will significantly facilitate the evolution of AI into true AGI that is both highly capable and beneficial for humanity and beyond.
Not cool, China.
(Reuters) — Hackers behind a massive breach at hotel group Marriott International left clues suggesting they were working for a Chinese government intelligence gathering operation, according to sources familiar with the matter.
Marriott said last week that a hack that began four years ago had exposed the records of up to 500 million customers in its Starwood hotels reservation system.
Private investigators looking into the breach have found hacking tools, techniques and procedures previously used in attacks attributed to Chinese hackers, said three sources who were not authorized to discuss the company’s private probe into the attack.