Thursday, May 29, 2008

A robotic brain-computer interface

California Institute of Technology (Caltech) engineers have developed a robotic device able to act as a brain-computer interface. This is the ‘first robotic approach to establishing an interface between computers and the brain by positioning electrodes in neural tissue.’ According to the researchers, their approach ‘could enhance the performance and longevity of emerging neural prosthetics, which allow paralyzed people to operate computers and robots with their minds.’ Read More

Graphene-based gadgets may only be few years away

It's only a matter of a few years before scientists develop graphene based computer and TV displays, for researchers at the University of Manchester have taken a step in this direction by creating tiny liquid crystal devices with electrodes made from graphene. Read More

Friday, May 23, 2008

OLPC's new $75 XO-2 Laptop

It's take 2 for the One Laptop Per Child project--version XO-2 of its laptop geared for children in developing countries features two side by side screens. The XO-2 is expected to arrive in 2010.
Some highlights of the new laptop, according to Larry Dignan:
# OLPC is betting that new developments in hardware, software, display and processor technologies will lower the XO-2’s price tag to $75.
# OLPC is going with the 1 watt power consumption target so XO-2 can be powered by a hand crank.
# The XO-2 will feature dual-touch displaces for the e-book.

Google releases Health API to developers

Only a day after launching the actual Google Health service, they have now also released an API that health providers and developers who create health related applications can use to interact with Google’s data. This API supports a subset of the CCR (Continuity of Care Record) standard, as described here.
Your client application can use the Health Data API to create new medical records, request a list of medical records and query for medical records that match particular criteria.
According to the documentation, Google is opening up their database by giving developers the ability to create and read users’ medical records — but don’t worry, in order for an someone to get your information, you must explicitly grant them access. Read More

Thursday, May 15, 2008

Linköping University researchers break "unbreakable" crypto

Quantum cryptography has been regarded as 100-percent protection against attacks on sensitive data traffic. But now a research team at Linköping University in Sweden has found a hole in this advanced technology. Read More

Tuesday, May 6, 2008

Beating the Codebreakers With Quantum Cryptography

Cryptography has been an arms race, with codemakers and hackers constantly updating their arsenals, but quantum cryptography could theoretically give codemakers the upper hand. Even the absolute best in classical encryption, the 128-bit RSA, can be cracked using brute force computing power. However, quantum cryptography could make possible uncrackable code using quantum key distribution (QKD). Modern cryptography relies on the use of digital keys to encrypt data before sending it over a network so it can be decrypted by the recipient. QKD promises a theoretically uncrackable code, one that can be easily distributed and still be transparent. Additionally, the nature of quantum mechanics makes it so that if an eavesdropper tries to intercept or spy on the transmission, both the sender and the receiver will know. Any attempt to read the transmission will alert the sender and the receiver, allowing them to generate a new key to send securely. QKD had its first real-world application in Geneva, where quantum cryptography was used in the electronic voting system. Not only did QKD guarantee that the poll was secure, but it also ensured that no votes were lost in transmission, because the uncertainty principle established that there were no changes in the transmitted data. The SECOQC project, which did the work for the voting system, says the goal is to establish network-wide quantum encryption that can work over longer distances between multiple parties.

Thursday, May 1, 2008

Information Security Set for Explosive Growth

Driven by compliance and public confidence issues, information security is expected to expand dramatically over the next few years, according to new research released by Frost & Sullivan and (ISC)². Worldwide, the number of information security professionals will grow from 1.66 million in 2007 to about 2.7 million in 2012, experiencing a compound annual growth rate of 10 percent. Read More

Google diving into 3D mapping of oceans

Google is planning the creation of a 3D oceanographic map, ostensibly called Google Ocean, that should allow people to visualize underwater topography, locate specific sites or attractions, and use pan and zoom functions to navigate the environment. Oceanographers say such a tool would be very helpful, given the lack of an oceanographic terrain or depth model in Google Earth. Tim Haverland with NOAA's Fisheries Service notes that "you can't get in a submarine and in essence fly through the water and explore ocean canyons yet. Read More