Этот комплекс – это шаг к абсолютно новому ведению боевых действий. Мы уверенно держимся в первых рядах среди стран-производителей такого рода вооружений. Высокоточный беспилотный снаряд летит до 30 минут со скоростью 130 км в час. Заряд на данном комплексе доставляется к цели вне зависимости от ее скрытности и рельефа местности – как малых, так и на больших высотах. Это очень точное и максимально эффективное оружие, с которым очень трудно бороться с помощью традиционных средств ПВО.
The planned Robot Science Museum in Seoul will have a humdinger of a first exhibition: its own robotic construction. It’s very much a publicity stunt, though a fun one — but who knows? Perhaps robots putting buildings together won’t be so uncommon in the next few years, in which case Korea will just be an early adopter.
- マウスコンピューター / G-Tune ★
- ドスパラ （Dospara） ◎
- 日本HP （ヒューレット・パッカード） ◎
- DELL （デル） ○
- Microsoft（マイクロソフト） ○
Windows の会社。2012 年から 2in1 モデルを販売し、急速にシェアを拡大。
- Lenovo （レノボ） △
- Apple（アップル、Mac） ＊
Un compteur communicant est un compteur disposant de technologies dites AMR (Automated Meter Reading) qui mesure de manière détaillée et précise, et éventuellement en temps réel, une consommation d’électricité, d’eau ou de gaz. La transmission des données s’effectue par ondes radio ou par courants porteurs en ligne (CPL) au gestionnaire du réseau de distribution chargé du comptage.
Les compteurs communicants servent à produire des factures sur la consommation réelle, à repérer des gaspillages, des pertes en ligne ou les postes qui coûtent le plus au client. Ils peuvent éventuellement l’informer de microcoupures ou de pertes des réseaux électriques.
Si le compteur est en outre « programmable à distance » et équipé d’un appareil de coupure à distance, il est dit « AMM » (Advanced Meter Management). Ces fonctions sont à la base de l’évolution des réseaux (d’électricité, d’eau ou de gaz) vers les « réseaux intelligents ».
Imagine sitting in your car in a drive-through, just after ordering a cup of coffee. As you wait for the barista to make your drink, a stranger opens your passenger door, reaches for the gas pedal, and floors it. Your car is burning gas quickly and could be sustaining damage to its engine.
Now imagine that the car is your computer, and the stranger is code running in your Web browser.
Congratulations, you’re a victim of cryptojacking, a relatively new method of mining cryptocurrency that involves harvesting an external device’s processing and electrical power to perform transaction-validating cryptographic calculations. As cryptojackers leech power from and compromise site visitors’ hardware, they line their pockets with portions of the bitcoin, litecoin, monero, ethereum, and other cryptocurrencies they mine.
Securing code for cars is not impossible.
There’s a ton we could do to make cars more secure.
The tech exists; it’s more a question of the will.
The Boeing EA-18G Growler is an American carrier-based electronic warfare aircraft. The Growler’s electronic warfare capability is primarily provided by Northrop Grumman.
The added electronics include AN/ALQ-218 wideband receivers on the wingtips and ALQ-99 high and low-band tactical jamming pods. The ALQ-218 combined with the ALQ-99 form a full spectrum electronic warfare suite that is able to provide detection and jamming against all known surface-to-air threats.
A fundamental design flaw in Intel’s processor chips has forced a significant redesign of the Linux and Windows kernels to defang the chip-level security bug.
Programmers are scrambling to overhaul the open-source Linux kernel’s virtual memory system. Meanwhile, Microsoft is expected to publicly introduce the necessary changes to its Windows operating system in an upcoming Patch Tuesday: these changes were seeded to beta testers running fast-ring Windows Insider builds in November and December.
Crucially, these updates to both Linux and Windows will incur a performance hit on Intel products. The effects are still being benchmarked, however we’re looking at a ballpark figure of five to 30 per cent slow down, depending on the task and the processor model. More recent Intel chips have features – such as PCID – to reduce the performance hit. Your mileage may vary.
L’être humain est-il menacé par la technologie ?
La machine risque-t-elle de le dominer ?
Fantasmes ou réalité ?
L’emploi menacé ?
Des données biaisées ?
Vers un « piratage » de l’esprit humain ?
Interdire les armes autonomes ?
Tous surveillés ?
Comment protéger les données personnelles ?
Expliquer l’inexplicable ?
Responsables mais pas coupables ?
Problems involving combinatorial and continuous optimization are ubiquitous in our modern life. Classic examples include lead compound optimization in the development of medicine, frequency band and/or transmission power optimization in wireless communications, sparse coding for compressed sensing, Boltzmann sampling in machine learning, portfolio optimization in Fin Tech, and many others. Most of those problems belong to the non-deterministic polynomial (NP), NP-complete, and NP-hard classes in complexity theory and require exponential resources as the problem size increases. The QNN exploits quantum parallel searching at below OPO threshold, collective symmetry breaking at OPO threshold, and exponential probability amplification of the solution state at above OPO threshold to address this limitation.
AI is spreading to the enterprise at a phenomenal rate.
According to a global survey of 260 large organizations, a data and analytics company, 80 percent of enterprises are investing in AI and one in three “believe their company will need to invest more over the next 36 months to keep pace with competitors.”
Let’s get this out of the way: What is AI?
Like “Big Data,” it’s a buzz phrase and technology category that’s at once alluring and elusive. In general, enterprise AI includes things like machine and deep learning, voice recognition and response, Robotic Process Automation (RPA), automated communications and reporting, predictive analytics, and recommendation engines.
If you’re a purist, you’ll recognize that a more accurate description for most of these technologies would be software automation. But that’s less fun to throw around at parties.
Big Data is distinct from AI, but the Big Data revolution that started a few years back has enabled many of the technologies we’re calling AI.
If you’re positioned to drive adoption and deployment of any of these technologies, which many IT professionals are, you’re sitting on a huge opportunity, and potentially a leap into the C-suite.
The DuraPAC Pro is a powerful and robust portable computer suitable for tough environments and mobile applications. The aluminum and steel construction allows for it to be both lightweight and rugged. The steel design maintains the ruggedness and integrity of the model while at the same time, the aluminum allows it to be lightweight.
503 Service Unavailable
Service Temporarily Unavailable
The server is temporarily unable to service your request due to maintenance downtime or capacity problems. Please try again later.
Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.
Watson, can you grow into a multibillion-dollar business and become the engine of IBM’s resurgence?
IBM is betting its future that the answer is yes. Its campaign to commercialize Watson, the company’s version of artificial intelligence technology, stands out, even during the current A.I. frenzy in the tech industry.
IBM has invested billions of dollars in its Watson business unit, created at the start of 2014, which now employs an estimated 10,000 workers.
At the University of North Carolina School of Medicine, Watson was tested on 1,000 cancer diagnoses made by human experts. In 99 percent of them, Watson recommended the same treatment as the oncologists.
In 30 percent of the cases, Watson also found a treatment option the human doctors missed. Some treatments were based on research papers that the doctors had not read — more than 160,000 cancer research papers are published a year. Other treatment options might have surfaced in a new clinical trial the oncologists had not yet seen announced on the web.
But Watson read it all. “Humans enabled by A.I. is the way to go with genomics,” said Dr. Norman E. Sharpless, head of the school’s cancer center.
A user would never like to enter its data or information in the website if he/she feels that it would be insecure. Any unauthorized access may lead to identity theft which may subsequently lead to dire consequences. So the main problems associated with the website can be named as:
1. Loss of control: The user has to rely on the provider to ensure data security and privacy, resource availability, monitoring of services and resources.
2. Lack of Trust: Trusting a third party requires taking risks. Basically trust and risk are the opposite sides of the same coin. Some monitoring or auditing capabilities would be required to increase the level of trust.
Another key challenge is related to cost. As a general rule, the costs of managing user identities should be as low as possible to ensure a reasonable return on investment in the website.
A whole range of products can now take advantage of Vantablack’s astonishing characteristics, thanks to the development of a new spray version of the world’s blackest coating material. The new substance, Vantablack S-VIS, is easily applied at large scale to virtually any surface, whilst still delivering the proven performance of Vantablack.
Vantablack‘s nano-structure absorbs virtually all incident light, enabling the performance of precision optical systems to be optimized. The material’s developer, UK-based Surrey NanoSystems, has mimicked the performance of its original Vantablack with a new version that can be sprayed onto objects, rather than deposited using a chemical vapor deposition (CVD) process.
Vantablack S-VIS greatly widens the potential applications space, making it possible to coat larger complex shapes and structures. It is applied at temperatures that are easily withstood by common plastics, further extending its use. Even though the material is applied using a simple spraying process, it traps a massive 99.8% of incident light. This property gives Vantablack S-VIS its ability to make objects appear to be two-dimensional black holes, as it becomes impossible to make-out surface topography.
Five years ago, one of the worst earthquakes in history triggered a 10-metre high tsunami that crashed into the Fukushima Daiichi nuclear power station causing multiple meltdowns.
Today, the radiation at the Fukushima plant is still so powerful it has proven impossible to get into its bowels to find and remove the extremely dangerous blobs of melted fuel rods.
The plant’s operator, Tokyo Electric Power Co (Tepco) , has made some progress, such as removing hundreds of spent fuel roads in one damaged building. But the technology needed to establish the location of the melted fuel rods in the other three reactors at the plant has not been developed.
The fuel rods melted through their containment vessels in the reactors, and no one knows exactly where they are now. This part of the plant is so dangerous to humans, Tepco has been developing robots, which can swim under water and negotiate obstacles in damaged tunnels and piping to search for the melted fuel rods.
But as soon as they get close to the reactors, the radiation destroys their wiring and renders them useless.
The USA’s MIM-104 Phased Array Tracking Radar Intercept On Target (PATRIOT) anti-air missile system offers an advanced backbone for medium-range air defense, and short-range ballistic missile defense, to America and its allies. This article covers domestic and foreign purchase requests and contracts for Patriot systems. It also compiles information about the engineering service contracts that upgrade these systems, ensure that they continue to work, and integrate them with wider command and defense systems.
The Patriot missile franchise’s future appears assured. At present, 12 nations have chosen it as a key component of their air and missile defense systems: the USA, Germany, Greece, Japan, Israel, Kuwait, The Netherlands, Saudi Arabia, South Korea, Spain, Taiwan and the UAE. Poland, Qatar, and Turkey have all indicated varying levels of interest, and some existing customers are looking to upgrade their systems.
When it comes to deciding whether or not the whole of the ball passed over the line, the human eye can be inadequate. Our GoalRef™ goal-line technology supports referees by informing them immediately when a goal is scored.
In answering the question of ‘Goal or no goal?’, FIFA will in future be turning to the GoalRef™ goal-line technology developed by the Fraunhofer Institute for Integrated Circuits IIS. After successfully completing a demanding certification process, the GoalRefTM system was officially licensed by FIFA in November 2012, which means it is approved for use at official football matches. Since GoalRefTM produces a reliable decision immediately, it does not interrupt play or alter the character of the game.
I was driving 70 mph on the edge of downtown St. Louis when the exploit began to take hold.
Though I hadn’t touched the dashboard, the vents in the Jeep Cherokee started blasting cold air at the maximum setting, chilling the sweat on my back through the in-seat climate control system. Next the radio switched to the local hip hop station and began blaring Skee-lo at full volume. I spun the control knob left and hit the power button, to no avail. Then the windshield wipers turned on, and wiper fluid blurred the glass.
As I tried to cope with all this, a picture of the two hackers performing these stunts appeared on the car’s digital display: Charlie Miller and Chris Valasek, wearing their trademark track suits. A nice touch, I thought.
The Jeep’s strange behavior wasn’t entirely unexpected. I’d come to St. Louis to be Miller and Valasek’s digital crash-test dummy, a willing subject on whom they could test the car-hacking research they’d been doing over the past year. The result of their work was a hacking technique—what the security industry calls a zero-day exploit—that can target Jeep Cherokees and give the attacker wireless control, via the Internet, to any of thousands of vehicles. Their code is an automaker’s nightmare: software that lets hackers send commands through the Jeep’s entertainment system to its dashboard functions, steering, brakes, and transmission, all from a laptop that may be across the country.
Technology is always ideological.
The Active Denial System (ADS) is needed because it’s the first non-lethal, directed-energy, counter-personnel system with an extended range greater than currently fielded non-lethal weapons. Most counter-personnel non-lethal weapons use kinetic energy (rubber rounds, bean bags, etc.). A kinetic-based system has a higher risk of human injury, and its effectiveness varies in relation to the size, age and gender of the target. The Active Denial System, however, is consistently effective regardless of size, age and gender and has a range greater than small-arms range. The Active Denial System will provide military personnel with a non-lethal weapon that has the same effect on all human targets.
Every technology we develop is an extension of one of our own senses or capabilities. It has always been that way. The spear and the arrow extended the arm, the telescope extended the eye, and now the Kissinger kissing device extends the mouth. Every technology we’ve ever made has also altered the way we live. So how different will our lives be if the future we choose is the one with all these robots in it?
More to the point, how will we power that future? Every modern robotic form that exists, and every one still to come, depends on a supply of cheap energy. If the energy disappears, so will the robots. And, to a large degree, so will we, since the lifestyle we have built and come to depend on floats on a sea of electricity.
Trojans have the same right on the system as does the logged in user. In other words, if the user can, the Trojan can. This includes deleting or modifying files, installing other software, uninstalling software, or sending sensitive password and login information to a remote attacker.
Regardless of how the infection gets on the system, once installed, the system is under the control of the attacker. Often, the attacker will share the list of zombied systems with others, giving unfettered access to their collection of zombie machines by other ill-intended criminals. Attackers can also often simply scan for compromised machines, which often send a greeting of readiness to listening ears. Collectively, the zombied systems are referred to as a botnet.
These botnets are then used for a variety of criminal purposes all of which pose serious risk to the infected user as well as the entire Internet community.
China has moved a step closer to creating a supersonic submarine that could travel from Shanghai to San Francisco in less than two hours.
New technology developed by a team of scientists at Harbin Institute of Technology’s Complex Flow and Heat Transfer Lab has made it easier for a submarine, or torpedo, to travel at extremely high speeds underwater.
In theory, a supercavitating vessel could reach the speed of sound underwater, or about 5,800km/h, which would reduce the journey time for a transatlantic underwater cruise to less than an hour, and for a transpacific journey to about 100 minutes.
However, supercavitation technology has faced two major problems. First, the submerged vessel has needed to be launched at high speeds, approaching 100km/h, to generate and maintain the air bubble.
Second, it is extremely difficult – if not impossible – to steer the vessel using conventional mechanisms, such as a rudder, which are inside the bubble without any direct contact with water.
As a result, its application has been limited to unmanned vessels, such as torpedoes, but nearly all of these torpedoes were fired in a straight line because they had limited ability to turn.
The team of Chinese scientists had found an innovative means of addressing both problems.
I HAVE NO IDEA WHAT TIME IT IS. There are no windows in this office and no clock, only the blinking red LED display of a microwave, which flashes 12:00, 12:00, 12:00, 12:00. Joel and I have been programming for days. We have a bug, a stubborn demon of a bug. So the red pulse no-time feels right, like a read-out of our brains, which have somehow synchronized themselves at the same blink rate.
But what if they select all the text and / hit Delete. / Damn! The NULL case! / And if not were out of the text field and they hit space / yeah, like for / no parameter / Hell! / So what if we space-pad? / I dont know . Wait a minute! / Yeah, we could space-pad / and do space as numeric. / Yes! Well call SendKey(space) to? / the numeric object. / My God! That fixes it! / Yeah! That’ll work if / space is numeric! / if space is numeric!
We lock eyes. We barely breathe. For a slim moment, we are together in a universe where two human beings can simultaneously understand the statement if space is numeric!
Like increasing numbers of low-income mothers and fathers, Ms. Navarro is at the center of a new collision that pits sophisticated workplace technology against some fundamental requirements of parenting, with particularly harsh consequences for poor single mothers. Along with virtually every major retail and restaurant chain, Starbucks relies on software that choreographs workers in precise, intricate ballets, using sales patterns and other data to determine which of its 130,000 baristas are needed in its thousands of locations and exactly when. Big-box retailers or mall clothing chains are now capable of bringing in more hands in anticipation of a delivery truck pulling in or the weather changing, and sending workers home when real-time analyses show sales are slowing. Managers are often compensated based on the efficiency of their staffing.
Scheduling is now a powerful tool to bolster profits, allowing businesses to cut labor costs with a few keystrokes.
Yet those advances are injecting turbulence into parents’ routines and personal relationships, undermining efforts to expand preschool access, driving some mothers out of the work force and redistributing some of the uncertainty of doing business from corporations to families, say parents, child care providers and policy experts.
Sales of Fuel Cell sedan will begin in Japan before April 2015 where hydrogen stations are in place.
Preparations are underway for sales to begin in the US and Europe during the summer of 2015.
It is a vehicle equipped with a “Fuel Cell” that generates electricity through the chemical reaction between hydrogen and oxygen to power the motor driving the vehicle. Hydrogen, which replaces gasoline as fuel, is an environment-friendly energy source that can be produced from various raw materials.
The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.
Weighing only 16 grams, the Black Hornet looks like a tiny toy helicopter. But it’s really a nano-size piece of military hardware unlike anything on the battlefield today — experimental robot flies and hummingbirds not withstanding.
The PD-100 Black Hornet Personal Reconnaissance System, unveiled to the American public for the first time last week at the Association of the United States Army Expo in Washington, D.C., is a drone (actually, a pair of them) that a soldier can carry and operate as easily as he or she would a radio.
Successful testing yesterday with our Quantum Stealth (light bending material) covering a UAV (Unmanned Aerial Vehicle).
The UAV was able to taking off, fly a course at high speed, return back and land, repeating these tasks multiple times without any apparent change in the flight characteristics of the UAV.
Currently only special authorized groups in the Canadian and U.S. militaries have access to the material and Quantum Stealth has been classified by both countries …
Mriya has set up 240 world records including transportation of the heaviest cargo with mass of 253 tons, the heaviest single peace of cargo with mass of 186,7 t as well as the longest cargo having length of 42,1 m. But the main thing is that Mriya serves people reliably. The airplane repeatedly participated in humanitarian operations. Thus in October, 2009 the AN-225 performed several flights on delivery generators to Samoa. They were necessary for renewal of work of Satala electric station damaged by tsunami. Only spacious cabin of the AN-225 could accommodate ten 12-tons generators at once. Each of them was as large as 6-meters container.
You can’t judge great teachers by their looks. Or their English. Or their profession. Or their education. Or where they were born, where they live, how they dress, how much money they make.
We have one billion users of Office. You can’t expect them to change every day.
Every day, millions of office workers prepare memos and reports using scissors and paste, and store data on floppy disks, though they have plenty of digital memory in their computers and the cloud. Smartphone-toting executives have their mail dumped into in-boxes, one corporate message atop another.
They are not using these objects, of course, but clicking on the pictures of them in popular word-processing programs like Microsoft Word or Google Docs. The icons linger like vestigial organs of an old-style office, 31 years after IBM’s personal computer brought work into the software age. They symbolize an old style of office software, built for the time when the desktop computer was new and unfamiliar.
But no longer are workers tethered to a desk, or even to an office; we are all toting around laptops, tablets and smartphones to make every place a workplace. And so office software is changing. These days, what is important is collaboration, small screens, fast turnarounds, social media and, most of all, mobility.
Space has been expanding since the Big Bang 13.7 billion years ago. And we know that when you look at some of the cosmology models, there were early periods of the universe where there was explosive inflation, where two points would’ve went receding away from each other at very rapid speeds.
Nature can do it. So the question is, can we do it?
Russia’s Proton rocket crashed less than a minute after its liftoff from Baikonur, Kazakhstan on July 2, 2013. The rocket started veering off course right after leaving the pad, deviating from the vertical path in various directions and then plunged to the ground seconds later nose first. The payload section and the upper stage were sheered off the vehicle moments before it impacted the ground and exploded.
By July 9, it is transpired that investigators sifting through the wreckage of the doomed rocket had found critical angular velocity sensors, DUS, installed upside down. Each of those sensors had an arrow that was suppose to point toward the top of the vehicle, however multiple sensors on the failed rocket were pointing downward instead. As a result, the flight control system was receiving wrong information about the position of the rocket and tried to “correct” it, causing the vehicle to swing wildly and, ultimately, crash. The paper trail led to a young technician responsible for the wrong assembly of the hardware, but also raised serious issues of quality control at the Proton’s manufacturing plant, at the rocket’s testing facility and at the assembly building in Baikonur. It appeared that no visual control of the faulty installation had been conducted, while electrical checks could not detect the problem since all circuits had been working correctly.
(Your novel raises the question of whether technology will save us or destroy us. Which do you believe?)
I believe science will save us…although I tend to be an optimist. Obviously, science has wonderful potential to control disease, create new fuel supplies, engineer efficient food sources, and even allow us to migrate to new worlds. The problem, of course, is that every technology is a double-edged sword. The rocket engine that carries the space shuttle can also carry warheads. The medical breakthroughs that can eradicate disease–genetic research, for example-if misused, can bring about the end of the human race. The question is not whether or not science will expand to meet man’s growing needs, but whether man’s philosophy will mature fast enough that we can truly comprehend our new power and the responsibility that comes with it.
Recent studies on the functional morphology of fins of fishes show a surprising biomechanical effect of the fin rays. The bionic implementations of these constructions led to shape-adaptive wing profiles and flow control devices. The functional principle has been patented as “Fin Ray Effect” and a line of products based on this effect is currently being developed.
The U.S. Army Research Laboratory’s (ARL), Army Research Office’s (ARO) initial concept of exploring DNA as a tagging and tracking method has led to the discovery of an optical scanning technology that can identify counterfeit electronic components before they are integrated into Army materiel.
The technology also provides the capability to identify and track materiel in the absence of external tags or barcodes.
This timely discovery will help address a significant challenge within the Army and DoD: the presence of counterfeit electronic components in military equipment.
New modifications include the newly rolled-out Phazotron Zhuk-AE active electronically scanned array (AESA) radar. The Phazotron Zhuk-AE AESA radar offers a wider range of operating frequencies, providing more resistance to electronic countermeasures (ECM), more detection range, more air and ground targets detected, tracked and able to be engaged simultaneously. The radar is thought to have detection range of 160 km (86 nmi) for air targets and 300 km (160 nmi) for ships.
Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance – better known as C4ISR. From leading-edge microelectronics to the largest, most complex system-of-systems in the world, Northrop Grumman’s C4ISR breadth, depth and ability provides first responders, intelligence gatherers, decision-makers and military personnel on the front lines the tools necessary to act with speed and confidence.
Aerial combat in the coming decades will be dominated by players who have command of information over their opponents, and are able to exploit that advantage offensively. Information has become the new high ground in the game of aerial combat. Globally, and especially in Asia, this has been reflected by sustained high levels of investment in capabilities historically operated only the US and NATO nations, such as AWACS/AEW&C and networking of combat aircraft, AWACS/AEW&C and ground based surveillance systems.
Concurrently we have observed strong investment in counter-ISR systems, intended to render AWACS/AEW&C impotent. Such systems include very long range air to air missiles such as the Russian R-37/AA-13 Arrow and R-172/K-100 intended to destroy AWACS/AEW&C, but also capable ground based jamming systems like the SPN-2/4/30 series, Pelena 1, Topol E and supporting ELINT systems like the Orion/Vega 85V6 series.
Basic technologies determine what kind of airframes, propulsion, systems and weapons can be employed by either side in a conflict. The side with a significant lead in basic technology will prevail, all else being equal, due to the performance and capability gains that lead confers.
Perhaps the most foolish of the popular misconceptions of Russian basic technology is that which assumes that the US and EU maintain the technological lead of 1-2 decades held at the end of the Cold War. Alas, nearly two decades later, in a globalised, digitised and networked world, the US retains a decisive lead only in top end stealth technologies, and some aspects of networking and highly integrated systems software. The Russians have closed the gap in most other areas, but importantly, have mastered the difficult embedded software technology so critical for radar and electronic warfare systems, as well as sensor fusion, networking and engine and flight controls. The Russians are working very hard at closing the remaing gap, with the planned PAK-FA fighter to be properly shaped for low observable and very low observable stealth capability.
The latest Russian MiG-35 Fulcrum F and Su-35-1 Flanker E+ both illustrate this in a very convincing manner.
Italy’s 5-Star Movement, led by comic Beppe Grillo, wants to scrap the country’s planned purchase of 90 Lockheed Martin Corp F-35 fighter jets and use the savings to help boost the struggling economy.
Eliminating the purchase of the fighter jets would save Italy a total of an estimated 10 billion euros but it would leave the Air Force and the country’s new aircraft carrier with an outdated fighter fleet.
The troubled F-35 is seven years behind schedule and 70 percent over early cost estimates, and orders for the super technological new jet have been cut during an economic crisis that has shrunk defence budgets worldwide.
Last year, Italy cut its F-35 order to 90 warplanes from the 131 it had agreed to buy more than a decade ago, a move it said would save 5 billion euros. The package also includes maintenance work for Italy’s state controlled defence technology group Finmeccanica.
The 5-Star Movement does not have enough votes in parliament to shoot down the jet purchases on its own, but political momentum against the Joint Strike Fighter is building.
We initially planned for a nine-month mission, which we are roughly at now, but we will continue to extend the mission as circumstances allow. Keeping the X-37 in orbit will provide us with additional experimentation opportunities and allow us to extract the maximum value out of the mission.
We are learning new things about the vehicle every day, which makes the mission a very dynamic process.
Google Glass consists of a small display situated on a frame that resembles eyeglasses. It is connected to a camera, microphone and bone-conducting speaker. Glass pairs with your smartphone wirelessly using Bluetooth, but also can use Wi-Fi to access the Internet. You can use your voice or your finger to get it to take photos, record video, initiate video or voice chats, send messages, search Google and translate words or phrases. Google’s being a bit coy about the ship date for this groundbreaking wearable computer. However, while qualifying early adopters are paying $1,500 a pop for the privilege of owning it first, we’re told that it will become more widely available by year’s end-with a slightly more affordable price tag.
One of the reasons Glass will find itself unwelcome in places is because its camera lives at the wearer’s eye level. It takes photos or record videos without a red blinking light telling others it’s happening. Anywhere cameras and other recording devices are unwelcome, the same would most certainly go for Google Glass.
For starters, you can forget about taking Glass to Las Vegas. Casinos are another place where surreptitious recording equipment won’t be welcome.
The Petabyte Age is different because more is different. Kilobytes were stored on floppy disks. Megabytes were stored on hard disks. Terabytes were stored in disk arrays. Petabytes are stored in the cloud. As we moved along that progression, we went from the folder analogy to the file cabinet analogy to the library analogy to — well, at petabytes we ran out of organizational analogies.
At the petabyte scale, information is not a matter of simple three- and four-dimensional taxonomy and order but of dimensionally agnostic statistics. It calls for an entirely different approach, one that requires us to lose the tether of data as something that can be visualized in its totality. It forces us to view data mathematically first and establish a context for it later. For instance, Google conquered the advertising world with nothing more than applied mathematics. It didn’t pretend to know anything about the culture and conventions of advertising — it just assumed that better data, with better analytical tools, would win the day. And Google was right.
- Dynamic RAM size (smallest feature sizes decreasing exponentially)
- Dynamic RAM price performance (improving exponentially)
- Average Transistor price (decreasing exponentially)
- Transistor Manufacturing costs (decreasing exponentially)
- Microprocessor clock speeds (increasing exponentially)
- Microprocessor costs (decreasing exponentially)
- Transistors per microprocessor (increasing exponentially)
- Processor performance (increasing exponentially)
- DNA sequencing costs per base pair (decreasing exponentially)
- Random Access Memory bits per dollar (increasing exponentially)
- Magnetic data storage bits per dollar (increasing exponentially)
- Wireless Internet and phone services price performance (increasing exponentially)
- Number of Internet hosts (increasing exponentially)
- Bytes of Internet traffic (increasing exponentially)
- Internet backbone bandwidth (increasing in a very terraced, quasi-exponential manner)
- Mechanical device sizes (decreasing exponentially)
- Number of scientific citations for nanotechnology research (increasing exponentially)
- Number of U.S. nanotech patents (increasing exponentially)