Menu

Blog

Archive for the ‘security’ category: Page 4

Jul 9, 2024

New technique offers unprecedented control over light at terahertz frequencies

Posted by in categories: biotech/medical, security

Researchers have developed a novel method for generating structured terahertz light beams using programmable spintronic emitters. This breakthrough offers a significant leap forward in terahertz technology, enabling the generation and manipulation of light with both spin and orbital angular momentum at these frequencies for the first time.

Terahertz radiation lies between microwaves and on the electromagnetic spectrum. It holds great promise for various applications, including security scanners, medical imaging, and ultrafast communication. However, generating and controlling terahertz light effectively has proven challenging.

This new research, published in eLight and led by Prof. Zhensheng Tao, Prof. Yizheng Wu from Fudan University and Prof. Yan Zhang from Capital Normal University, overcomes these limitations by employing programmable spintronic emitters based on exchange-biased magnetic multilayers. These devices consist of thin layers of magnetic and non-magnetic materials that convert laser-induced spin-polarized currents into broadband terahertz radiation.

Jul 8, 2024

How Quantum Computing Is Already Changing the World

Posted by in categories: computing, encryption, quantum physics, security

The power of quantum computing drives a desperate need for quantum encryption. This megatrend is creating a multi-billion-dollar security market.

Jul 8, 2024

Engineers develop advanced optical computing method for multiplexed data processing and encryption

Posted by in categories: computing, encryption, security

Engineers at the University of California, Los Angeles (UCLA) have unveiled a major advancement in optical computing technology that promises to enhance data processing and encryption. The work is published in the journal Laser & Photonics Reviews.

This innovative work, led by Professor Aydogan Ozcan and his team, showcases a reconfigurable diffractive optical network capable of executing high-dimensional permutation operations, offering a significant leap forward in telecommunications and data security applications.

Permutation operations, essential for various applications, including telecommunications and encryption, have traditionally relied on electronic hardware. However, the UCLA team’s advancement uses all-optical diffractive computing to perform these operations in a multiplexed manner, significantly improving efficiency and scalability.

Jul 8, 2024

Flying Qudits: Unlocking New Dimensions of Quantum Communication

Posted by in categories: computing, encryption, internet, quantum physics, security

Researchers have developed a breakthrough method for quantum information transmission using light particles called qudits, which utilize the spatial mode and polarization properties to enable faster, more secure data transfer and increased resistance to errors.

This technology could greatly enhance the capabilities of a quantum internet, providing long-distance, secure communication, and leading to the development of powerful quantum computers and unbreakable encryption.

Scientists have made a significant breakthrough in creating a new method for transmitting quantum information using particles of light called qudits. These qudits promise a future quantum internet that is both secure and powerful.

Jul 7, 2024

China’s Laws of Robotics: Shanghai publishes first humanoid robot guidelines

Posted by in categories: robotics/AI, security

Makers of humanoid robots should guarantee that their products “do not threaten human security” and “effectively safeguard human dignity”, according to a new set of guidelines published in Shanghai during the World Artificial Intelligence Conference (WAIC) on Saturday.

They should also take measures that include setting up risk warning procedures and emergency response systems, as well as give users training on the ethical and lawful use of these machines, according to the guidelines.

Jul 6, 2024

The Mathematics of Reliable Artificial Intelligence

Posted by in categories: mathematics, robotics/AI, security, transportation

By Gitta Kutyniok

The recent unprecedented success of foundation models like GPT-4 has heightened the general public’s awareness of artificial intelligence (AI) and inspired vivid discussion about its associated possibilities and threats. In March 2023, a group of technology leaders published an open letter that called for a public pause in AI development to allow time for the creation and implementation of shared safety protocols. Policymakers around the world have also responded to rapid advancements in AI technology with various regulatory efforts, including the European Union (EU) AI Act and the Hiroshima AI Process.

One of the current problems—and consequential dangers—of AI technology is its unreliability and subsequent lack of trustworthiness. In recent years, AI-based technologies have often encountered severe issues in terms of safety, security, privacy, and responsibility with respect to fairness and interpretability. Privacy violations, unfair decisions, unexplainable results, and accidents involving self-driving cars are all examples of concerning outcomes.

Jul 1, 2024

Multinational fusion energy project marks completion of its most complex magnet system

Posted by in categories: education, nuclear energy, security

After two decades of design, production, fabrication and assembly on three continents, the historic, multinational ITER fusion energy project today celebrates the completion and delivery of its massive toroidal field coils from Japan and Europe.

Masahito Moriyama, Japan’s Minister of Education, Culture, Sports, Science and Technology, and Gilberto Pichetto Fratin, Italy’s Minister of Environment and Energy Security, will attend the ceremony with officials from other ITER members.

Nineteen gigantic toroidal field coils have been delivered to southern France. They will be key components in ITER, the experimental fusion mega-project that will use magnetic confinement to imitate the process that powers the sun and stars and gives Earth light and warmth.

Jul 1, 2024

Bypassing the blood–brain barrier

Posted by in categories: biotech/medical, neuroscience, security

By 2024–06-24T12:55:00

Researchers are on a quest to outsmart and overcome the sophisticated security system of the brain. Julia Robinson reports on some of the approaches being studied.

Jun 28, 2024

Redwire Awarded DARPA Prime Contract for SabreSat Spacecraft Very Low-Earth Orbit Demonstration

Posted by in categories: economics, satellites, security

JACKSONVILLE, Fla. (June 17, 2024) – Redwire Corporation (NYSE: RDW), a leader in space infrastructure for the next generation space economy, announced today that it has been awarded a contract from the Defense Advanced Research Projects Agency (DARPA) to be the prime mission integrator for the development of a revolutionary air-breathing satellite that will demonstrate the use of novel electric propulsion systems in very low-Earth orbit (VLEO) using Redwire’s SabreSat VLEO platform. The program leverages Redwire’s worldwide leadership in developing and providing VLEO capabilities.

The strategic significance of VLEO is growing – especially for national security missions. While low-Earth (LEO) and geosynchronous (GEO) orbits are becoming increasingly congested and contested, spacecraft in VLEO operate in a relatively unimpaired environment. Bridging the gap between air and space, VLEO spacecraft fly above airborne anti-access areas while operating significantly closer to the area of responsibility on the ground than existing satellites. Additionally, unlike LEO and GEO, debris in VLEO deorbits in hours or days rather than in decades or more.

“We are proud to be leveraging our SabreSat satellite design to support critical VLEO technology advancements for DARPA’s game-changing Otter program,” said Spence Wise, Redwire Senior Vice President, Missions and Platforms. “As VLEO emerges as a critical domain for national security missions, Redwire is continuing to make investments to support technology innovation and strategic operations in this environment.”

Jun 27, 2024

As mind-reading technology improves, Colorado passes first-in-nation law to protect privacy of our thoughts

Posted by in categories: biotech/medical, law, neuroscience, security

But while medical research facilities are subject to privacy laws, private companies — that are amassing large caches of brain data — are not. Based on a study by The Neurorights Foundation, two-thirds of them are already sharing or selling the data with third parties. The vast majority of them also don’t disclose where the data is stored, how long they keep it, who has access to it, and what happens if there’s a security breach…

This is why Pauzauskie, Medical Director of The Neurorights Foundation, led the passage of a first-in-the-nation law in Colorado. It includes biological or brain data in the State Privacy Act, similar to fingerprints if the data is being used to identify people.

“This is a first step, but we still have a long way to go,” he says.

Page 4 of 14212345678Last