Toggle light / dark theme

About 5 years ago a friend of mine at Microsoft (Mitch S.) had a vision of making a new security model around drone swarms and a form of BMI technology. Glad to see the vision come true.


Scientists have discovered how to control multiple robotic drones using the human brain, an advance that can help develop swarms of search and rescue drones that are controlled just by thought.

A controller wears a skull cap outfitted with 128 electrodes wired to a computer. The device records electrical brain activity. If the controller moves a hand or thinks of something, certain areas light up. “I can see that activity from outside. Our goal is to decode that activity to control variables for the robots,” said Panagiotis Artemiadis, from the Arizona State University in the US. If the user is thinking about spreading the drones out, we know what part of the brain controls that thought, Artemiadis said.

A wireless system sends the thought to the robots. “We have a motion-capture system that knows where the quads are, and we change their distance,” he said. Up to four small robots, some of which fly, can be controlled with brain interfaces. To make them move, the controller watches on a monitor and thinks and pictures the drones performing various tasks.

Read more

The warning from QuintessenceLabs’ CTO John Leisoboer is stark. “When sufficiently powerful quantum computers become generally available,” he says, “it’s guaranteed to break all existing cryptographic systems that we know of.”

In other words, he adds, “Everything that we’re doing today will be broken.”

It’s a sentiment echoed by Google’s Chrome security software engineer Matt Braithwaite who wrote in a blog post earlier this month that “a hypothetical, future quantum computer would be able to retrospectively decrypt any internet communication that was recorded today”.

Read more

Nice chime on QC.


Manoj Saxena is the executive chairman of CognitiveScale and a founding managing director of The Entrepreneurs’ Fund IV (TEF), a $100m seed fund focused exclusively on the cognitive computing space.

Saxena is also the chairman of Federal Reserve Bank of Dallas, San Antonio branch and Chairman, SparkCognition an Austin based cognitive security and safety analytics company.

Prior to joining TEF, Saxena was general manager, IBM Watson, where his team built the world’s first cognitive systems in healthcare, financial services, and retail. Earlier he founded, built and sold two Austin based software startups.

Read more

Good article overall; and yes QC is still evolving. However, to state Quantum networking is in its infancy is a wrong & misleading comment. Since 2009, Quantum Internet has been in beta at Los Alamos Labs. And, researchers will tell you that QC development can as far back as 1970s and the first official QC was introduced in 2009 when the first universal programmable quantum computer was introduced by University of Toronto’s Kim Luke.


Google has launched a two-year Chrome trial aimed at safeguarding the Internet against quantum computers, which security experts predict will shred all data.

Read more

As we reported last month app collusion, where apps work together to extract sensitive data, now represents a very real security risk to mobile devices.

To address this emerging threat, component technology firm Formaltech, today is releasing FUSE, a DARPA-funded tool that detects inter-application collusion and other vulnerabilities in Android apps.

The FUSE platform identifies potential security vulnerabilities and tracks information flow through multiple apps, revealing potential collusion between apps. The tool uses static binary analysis to detect vulnerabilities without requiring the source code of the apps, allowing security professionals to analyze third party apps without the need for vendor cooperation. It operates in the cloud, supporting Android app (APK) analysis from anywhere. Developers and testers can easily drill down into the FUSE interface when FUSE displays errors, warnings and informational alarms.

Read more

You got to luv this one.


The security agency must defend itself in a US appeals court for violating the rights of a convicted bomber by supposedly illegally spying on him.

A US appeals court will weigh a constitutional challenge on Wednesday to a warrantless government surveillance program, brought by an Oregon man found guilty of attempting to detonate a bomb in 2010 during a Christmas tree-lighting ceremony.

The case before a three-judge panel of the 9th US Circuit Court of Appeals is the first of its kind to consider whether a criminal defendant’s constitutional privacy rights are violated under a National Security Agency (NSA) program that allows spying on Americans’ international phone calls and internet communications.

Read more

Nice that they are trying to ensure this. However, as we integrate more tech into Biocomputing space and our efforts in achieving singularity; you will need some level of a medical/ or bio background.


It’s hard enough for IT security managers to keep with the latest in conventional computing. Cloud Security Alliance and the US government are trying to make sure you don’t need a physics degree, too.

Read more

Q-Dot demand in Healthcare is predicted to be high.

http://embedded-computing.com/news/rising-quantum-dots-market/#


Quantum Dots Market is driven by increasing demand for energy efficient displays and lighting solutions, North America accounted for largest quantum dots market share, use of quantum dots in solar cells and VLSI design is expected to open new possibilities for quantum dots market.

Quantum dots are semiconducting nanoparticles that range from 1nm to 10nm diameter in size and demonstrate quantum mechanical properties. The peculiarity of quantum dots is that they have ability to unite their semiconductor properties with those of nanomaterials. In addition, tunable nanocrystal size and superior optical properties have made quantum dots attractive semiconducting material for variety of applications in the field of healthcare, optoelectronics, solar energy, and security among others.

Read more