Toggle light / dark theme

Excellent write up on QUESS; and yesterday we saw that the first set of code was transmitted successfully which means so far success. However, many are asking when will the US respond about our own efforts around our own efforts of a Quantum satellite and our own progress around improving the net infrastructure to ensure we’re not a sitting duck for government backed hackers. Granted we have been operating for many years a version of a Quantum Internet at Los Alamos; however, we need to expand and accelerate the efforts around the Quantum Internet restructuring.


In mid August China launched “QUESS” (Quantum Experiments at Space Scale), a new type of satellite that it hopes will be capable of “quantum communications” which is supposed to be hack-proof, through the use of “quantum entanglement”. This allows the operator to ensure that no one else is listening to your communications by reliably distributing keys that are then used for encryption in order to be absolutely sure that there is no one in the middle intercepting that information.

According the Chinese scientists involved in the project, quantum encryption is secure against any kind of computing power because information encoded in a quantum particle is destroyed as soon as it is measured. (According to Tibor Molnar a scientist at the University of Sydney), the only way to ‘observe’ a photon is to have it interact with (a) an electron, or (b) an electromagnetic field. Either of these interactions will cause the photon to “decohere” – i.e., interfere with it in a way that will be apparent to the intended recipient.

Gregoir Ribordy, co-founder of Geneva-based quantum cryptography firm ID Quantique, likened it to sending a message written on a soap bubble. “If someone tries to intercept it when it’s being transmitted, by touching it, they make it burst.”

Read more

Engenheiros da Universidade de Washington introduziram uma nova forma de comunicação que permite que dispositivos como implantes cerebrais, lentes de contato, cartões de crédito e pequenos eletrônicos vestíveis falar com aparelhos de uso diário, como smartphones e relógios.

Este novo” Comunicação interscatter” funciona convertendo sinais Bluetooth em transmissões Wi-Fi através do ar. Usando apenas reflexões, um dispositivo interscatter como uma inteligente de lentes de contato converte sinais Bluetooth a partir de um SmartWatch, por exemplo, em transmissões Wi-Fi que podem ser apanhados por um smartphone.

Read more

Earlier this year at Facebook’s F8 conference, the company revealed three innovation pillars that make up the company’s ten-year vision: connectivity, artificial intelligence (AI), and virtual reality (VR). Facebook’s Chief Technology Officer Mike Schroepfer is responsible for leading each of them. Despite the fact that the vision is ten-years in duration, the company has made significant progress in each.

Facebook’s progress in AI can been seen in everything from the company’s news feed to the way in which people are tagged. The virtual reality innovations are best demonstrated through the Oculus Rift, which I demo’d last Thursday. More recently, the company made a great flight forward on the connectivity pillar as Acquila, a long-endurance plane that will fly above commercial aircraft and the weather, took flight in Arizona. The goal is for this v-shaped aircraft that has a wingspan longer than a Boeing 737, but weighs under 1,o00 pounds to bring basic internet access to the developing world.

I met with Schroepfer at Facebook’s headquarters in Menlo Park, and we discussed these three pillars and a variety of other topics, including the company’s recruiting methods, how the company maintains its innovative edge, and the logic behind its headquarters — one of the largest open-space offices in the world.

Read more

A team of 5G researchers has set a new world record for spectrum efficiency with the wireless technology, Massive MIMO (Multiple-Input Multiple-Output), overwhelming today’s existing 4G technology, 22-fold. To test how well the technology works in a real world setting, the researchers from Bristol will visit Lund at the end of August.

In the future, users are expected to exchange much more information over the spectrum. However, with its dwindling supply, we need to find a way to exchange all this new data more efficiently without causing delays for everyone using the available spectrum.

In response to this insufficiency, many researchers have been conducting experiments using a form of 5G technology called Massive MIMO (Multiple-Input Multiple-Output) which would allow for the simultaneous transfer of data with the use of multiple transmitters and receivers.

Read more

Like this article; there is 2 more pieces missing from the roadmap for 2010 & beyond and that is Biocomputing & Singularity. Biocomputing will provide the financial industry (banks, trading firms, accounting & audit firms, bond insurers, etc.) the ability to expand information/ data storage and transmission capacities like we have never see before just look at what Microsoft, Google, Amazon, etc. have done with DNA storage. And, the much loved Singularity enables boosting of knowledge and insights as well as more mobility and access to information as they need it. BTW — Biometrics is NOT the same as Biocomputing; biocomputing goes well beyond security/ identity management.


The influential non-profit rates these technologies alongside the PC, the internet, and smartphones in terms of their potential to transform financial…

Read more

New method on how to attend Def Con.


LAS VEGAS (AP) — Lock picking might seem ridiculously old-fashioned at a cybersecurity gathering — but learning it can actually help people protect machines from digital threats.

As security improves to block remote attacks over the internet, hackers look for ways to deliver malicious software physically instead — for instance, by breaking into a company’s data centers. Like cracking a digital system, picking locks involves solving puzzles, along with a certain amount of finesse and skill.

And for the good guys, knowing how to pick locks is important for learning how to defend against it.

Read more

Glad folks realizes and admit to the risks; however, I stand by my argument until the underpinning technology is still tied to dated digital technology; it will be hacked by folks like China who are planning to be on a new Quantum network and platforms. Reason why all countries must never lose sight of replacing their infrastructure and the net with Quantum technology.


A team of researchers from Pittsburgh has won DARPA’s Cyber Grand Challenge – a competition billed as the ‘world’s first automated network defense tournament.’ The implications for the Internet of Things (IoT) are grave, as the machines on display threaten to ravage the already flaky state of IoT security.

DARPA, the Department of Defense’s (DoD) Defense Advanced Research Projects Agency, is a wing of the US military that investigates how the latest technological breakthroughs can be put to use on the battlefield. With nation-state cybersecurity now declared a new front in conventional warfare, militaries around the world will be flocking to gather the tools needed to exert force in this new medium.

So while the DARPA competition presents itself as a smiley affair, it dies represent the new face of an emerging weapon – and the most promising weapon on display came from the aforementioned ForAllSecure, a startup with close ties to Pittsburgh’s Carnegie Mellon University.

Read more

New way for IoT and data centers in general to improve energy use, costs, etc.


Arrays based on vertical-cavity surface-emitting lasers offer a high-bandwidth, low-power, and low-cost solution for intra-data centers.

With the emergence of high-performance digital systems and the rapid growth of Internet traffic in the 1990s, the US Air Force Research Laboratory (AFRL) Micro Electronics Technology Directorate correctly predicted the growing need for optical interconnects and thus initiated several efforts to develop such technologies for the next generation of high-performance digital systems. This work was also prompted by significant advances in optical materials (i.e., III-V materials and polymers), devices (vertical-cavity surface-emitting lasers, VCSELs), and packaging technologies that were also made during this period.1 In collaboration with the Defense Advanced Research Projects Agency (DARPA) Electronic Technology Office, the AFRL thus initiated several major programs in this area.

Read more

Nice — another step forward for all things connected.


Scientists can now talk to and even command living cells–to a limited degree at the moment, but with massive implications for the future. MIT biological engineers have created a computer code that allows them to basically hijack living cells and control them. It works similarly to a translation service, using a programming language to create a function for a cell in the form of a DNA sequence. Once it’s scalable, the invention has major ramifications. Future applications could include designing cells that produce a cancer drug when a tumor is detected or creating yeast cells that halt their own fermentation if too many toxic byproducts build up.

That’s not to imply it isn’t a big deal already. The code allows anyone, even someone without a biology background, to modify a pre-existing cell. All that’s required is knowledge of the programming language, which is based on one commonly used for computer chips called Verilog. “You could be completely naive as to how any of it works,” MIT biological engineering professor Christopher Voigt said in a press release. “That’s what’s really different about this. You could be a student in high school and go onto the Web-based server and type out the program you want, and it spits back the DNA sequence.” To learn more, read the full story here. For more on the confluence of biology and technology, watch this TED Talk below.

Read more