Category Archives: technology
マウスコンピューター / G-Tune ★ デザインと高性能を両立、価格も安めで、ここ10年で急成長したメーカー。 ドスパラ （Dospara） ◎ 高性能なデスクトップを安く手に入れたいなら定番の１つ。 日本HP （ヒューレット・パッカード） ◎ デザイン重視の個人向けのモデルが中心。ノート 、スリムデスクトップが得意。 DELL （デル） ○ 安さで勝負。デザインや追加機能よりもコストパフォーマンス優先。 Microsoft（マイクロソフト） ○ Windows の会社。2012 年から 2in1 モデルを販売し、急速にシェアを拡大。 Lenovo （レノボ） △ 中国のメーカーで安い。ビジネス用が中心で、堅牢さと安定性を重視。 Apple（アップル、Mac） ＊ 独自規格。ソフトや周辺機器は専用品が必要。デザイン等に優れるが高価。
Implications of Artificial Intelligence (AI) for Policy and Research
耐震構造 制振構造 免震構造
По словам Эллы Памфиловой, около двух часов ночи сайт ЦИК подвергся DDOS-атаке. Ранее о кибератаках на российские сайты, в том числе ведомств, сообщали в «Ростелекоме» и Минкомсвязи.
Un compteur communicant est un compteur disposant de technologies dites AMR (Automated Meter Reading) qui mesure de manière détaillée et précise, et éventuellement en temps réel, une consommation d’électricité, d’eau ou de gaz. La transmission des données s’effectue par ondes radio ou par courants porteurs en ligne (CPL) au gestionnaire du réseau de distribution chargé du comptage. Les compteurs communicants servent à produire des factures sur la consommation réelle, à repérer des gaspillages, des pertes en ligne ou les postes qui coûtent le plus au client. Ils peuvent éventuellement l’informer de microcoupures ou de pertes des réseaux électriques. Si le compteur est en outre « programmable à distance » et … Continue reading
Imagine sitting in your car in a drive-through, just after ordering a cup of coffee. As you wait for the barista to make your drink, a stranger opens your passenger door, reaches for the gas pedal, and floors it. Your car is burning gas quickly and could be sustaining damage to its engine. Now imagine that the car is your computer, and the stranger is code running in your Web browser. Congratulations, you’re a victim of cryptojacking, a relatively new method of mining cryptocurrency that involves harvesting an external device’s processing and electrical power to perform transaction-validating cryptographic calculations. As cryptojackers leech power from and compromise site visitors’ hardware, they … Continue reading
Securing code for cars is not impossible. There’s a ton we could do to make cars more secure. The tech exists; it’s more a question of the will.
The Boeing EA-18G Growler is an American carrier-based electronic warfare aircraft. The Growler’s electronic warfare capability is primarily provided by Northrop Grumman. The added electronics include AN/ALQ-218 wideband receivers on the wingtips and ALQ-99 high and low-band tactical jamming pods. The ALQ-218 combined with the ALQ-99 form a full spectrum electronic warfare suite that is able to provide detection and jamming against all known surface-to-air threats.
モバイルネットワーク 1G：第1世代（アナログ無線、アナログ携帯電話） 2G：第2世代（データ通信、デジタル携帯電話） 3G：第3世代（脱地域限定、世界標準） 4G：第4世代（高速化、スマートフォン） 5G：第5世代（すべての端末・アプリケーション）
A fundamental design flaw in Intel’s processor chips has forced a significant redesign of the Linux and Windows kernels to defang the chip-level security bug. Programmers are scrambling to overhaul the open-source Linux kernel’s virtual memory system. Meanwhile, Microsoft is expected to publicly introduce the necessary changes to its Windows operating system in an upcoming Patch Tuesday: these changes were seeded to beta testers running fast-ring Windows Insider builds in November and December. Crucially, these updates to both Linux and Windows will incur a performance hit on Intel products. The effects are still being benchmarked, however we’re looking at a ballpark figure of five to 30 per cent slow down, … Continue reading
L’être humain est-il menacé par la technologie ? La machine risque-t-elle de le dominer ? Fantasmes ou réalité ? L’emploi menacé ? Des données biaisées ? Vers un « piratage » de l’esprit humain ? Interdire les armes autonomes ? Tous surveillés ? Comment protéger les données personnelles ? Expliquer l’inexplicable ? Responsables mais pas coupables ?
Problems involving combinatorial and continuous optimization are ubiquitous in our modern life. Classic examples include lead compound optimization in the development of medicine, frequency band and/or transmission power optimization in wireless communications, sparse coding for compressed sensing, Boltzmann sampling in machine learning, portfolio optimization in Fin Tech, and many others. Most of those problems belong to the non-deterministic polynomial (NP), NP-complete, and NP-hard classes in complexity theory and require exponential resources as the problem size increases. The QNN exploits quantum parallel searching at below OPO threshold, collective symmetry breaking at OPO threshold, and exponential probability amplification of the solution state at above OPO threshold to address this limitation.
AI is spreading to the enterprise at a phenomenal rate. According to a global survey of 260 large organizations, a data and analytics company, 80 percent of enterprises are investing in AI and one in three “believe their company will need to invest more over the next 36 months to keep pace with competitors.” Let’s get this out of the way: What is AI? Like “Big Data,” it’s a buzz phrase and technology category that’s at once alluring and elusive. In general, enterprise AI includes things like machine and deep learning, voice recognition and response, Robotic Process Automation (RPA), automated communications and reporting, predictive analytics, and recommendation engines. If you’re … Continue reading
The DuraPAC Pro is a powerful and robust portable computer suitable for tough environments and mobile applications. The aluminum and steel construction allows for it to be both lightweight and rugged. The steel design maintains the ruggedness and integrity of the model while at the same time, the aluminum allows it to be lightweight.
E-waste Management as a Global Challenge (PDF file)
503 Service Unavailable Service Temporarily Unavailable The server is temporarily unable to service your request due to maintenance downtime or capacity problems. Please try again later. Additionally, a 404 Not Found error was encountered while trying to use an ErrorDocument to handle the request.
Chromecast は、テレビの HDMI 端子に差し込むメディア ストリーミング デバイスです。お気に入りのテレビ番組、映画、音楽、スポーツ、ゲームなど、さまざまなコンテンツをモバイル端末からテレビにキャストできます。 Chromecast は iPhone、iPad、Android スマートフォン、Android タブレット、Mac または Windows 搭載のノートパソコン、Chromebook に対応しています。 20 万本以上のテレビ番組や映画、3,000 万曲もの音楽、さらにラジオ、スポーツ、ゲームなどからお好きなコンテンツをお楽しみいただけます。
Watson, can you grow into a multibillion-dollar business and become the engine of IBM’s resurgence? IBM is betting its future that the answer is yes. Its campaign to commercialize Watson, the company’s version of artificial intelligence technology, stands out, even during the current A.I. frenzy in the tech industry. IBM has invested billions of dollars in its Watson business unit, created at the start of 2014, which now employs an estimated 10,000 workers. ** At the University of North Carolina School of Medicine, Watson was tested on 1,000 cancer diagnoses made by human experts. In 99 percent of them, Watson recommended the same treatment as the oncologists. In 30 percent … Continue reading
For Better Health Good for Eye Sight Saves You Money
A user would never like to enter its data or information in the website if he/she feels that it would be insecure. Any unauthorized access may lead to identity theft which may subsequently lead to dire consequences. So the main problems associated with the website can be named as: 1. Loss of control: The user has to rely on the provider to ensure data security and privacy, resource availability, monitoring of services and resources. 2. Lack of Trust: Trusting a third party requires taking risks. Basically trust and risk are the opposite sides of the same coin. Some monitoring or auditing capabilities would be required to increase the level of … Continue reading
A whole range of products can now take advantage of Vantablack’s astonishing characteristics, thanks to the development of a new spray version of the world’s blackest coating material. The new substance, Vantablack S-VIS, is easily applied at large scale to virtually any surface, whilst still delivering the proven performance of Vantablack. Vantablack‘s nano-structure absorbs virtually all incident light, enabling the performance of precision optical systems to be optimized. The material’s developer, UK-based Surrey NanoSystems, has mimicked the performance of its original Vantablack with a new version that can be sprayed onto objects, rather than deposited using a chemical vapor deposition (CVD) process. Vantablack S-VIS greatly widens the potential applications space, … Continue reading
Five years ago, one of the worst earthquakes in history triggered a 10-metre high tsunami that crashed into the Fukushima Daiichi nuclear power station causing multiple meltdowns. Today, the radiation at the Fukushima plant is still so powerful it has proven impossible to get into its bowels to find and remove the extremely dangerous blobs of melted fuel rods. The plant’s operator, Tokyo Electric Power Co (Tepco) , has made some progress, such as removing hundreds of spent fuel roads in one damaged building. But the technology needed to establish the location of the melted fuel rods in the other three reactors at the plant has not been developed. The … Continue reading
────── どうやったら途切れない線になるのか？ ──────（罫線） ————— (—) ––––– (–) ――――― (―) ――――― (―) ————— (<nobr>—————</nobr>) (<s title=”———————”> </s>)
The USA’s MIM-104 Phased Array Tracking Radar Intercept On Target (PATRIOT) anti-air missile system offers an advanced backbone for medium-range air defense, and short-range ballistic missile defense, to America and its allies. This article covers domestic and foreign purchase requests and contracts for Patriot systems. It also compiles information about the engineering service contracts that upgrade these systems, ensure that they continue to work, and integrate them with wider command and defense systems. The Patriot missile franchise’s future appears assured. At present, 12 nations have chosen it as a key component of their air and missile defense systems: the USA, Germany, Greece, Japan, Israel, Kuwait, The Netherlands, Saudi Arabia, South … Continue reading
When it comes to deciding whether or not the whole of the ball passed over the line, the human eye can be inadequate. Our GoalRef™ goal-line technology supports referees by informing them immediately when a goal is scored. In answering the question of ‘Goal or no goal?’, FIFA will in future be turning to the GoalRef™ goal-line technology developed by the Fraunhofer Institute for Integrated Circuits IIS. After successfully completing a demanding certification process, the GoalRefTM system was officially licensed by FIFA in November 2012, which means it is approved for use at official football matches. Since GoalRefTM produces a reliable decision immediately, it does not interrupt play or alter … Continue reading
I was driving 70 mph on the edge of downtown St. Louis when the exploit began to take hold. Though I hadn’t touched the dashboard, the vents in the Jeep Cherokee started blasting cold air at the maximum setting, chilling the sweat on my back through the in-seat climate control system. Next the radio switched to the local hip hop station and began blaring Skee-lo at full volume. I spun the control knob left and hit the power button, to no avail. Then the windshield wipers turned on, and wiper fluid blurred the glass. As I tried to cope with all this, a picture of the two hackers performing these … Continue reading
Technology is always ideological.
The Active Denial System (ADS) is needed because it’s the first non-lethal, directed-energy, counter-personnel system with an extended range greater than currently fielded non-lethal weapons. Most counter-personnel non-lethal weapons use kinetic energy (rubber rounds, bean bags, etc.). A kinetic-based system has a higher risk of human injury, and its effectiveness varies in relation to the size, age and gender of the target. The Active Denial System, however, is consistently effective regardless of size, age and gender and has a range greater than small-arms range. The Active Denial System will provide military personnel with a non-lethal weapon that has the same effect on all human targets.
Every technology we develop is an extension of one of our own senses or capabilities. It has always been that way. The spear and the arrow extended the arm, the telescope extended the eye, and now the Kissinger kissing device extends the mouth. Every technology we’ve ever made has also altered the way we live. So how different will our lives be if the future we choose is the one with all these robots in it? More to the point, how will we power that future? Every modern robotic form that exists, and every one still to come, depends on a supply of cheap energy. If the energy disappears, so … Continue reading
Trojans have the same right on the system as does the logged in user. In other words, if the user can, the Trojan can. This includes deleting or modifying files, installing other software, uninstalling software, or sending sensitive password and login information to a remote attacker. Regardless of how the infection gets on the system, once installed, the system is under the control of the attacker. Often, the attacker will share the list of zombied systems with others, giving unfettered access to their collection of zombie machines by other ill-intended criminals. Attackers can also often simply scan for compromised machines, which often send a greeting of readiness to listening ears. … Continue reading
China has moved a step closer to creating a supersonic submarine that could travel from Shanghai to San Francisco in less than two hours. New technology developed by a team of scientists at Harbin Institute of Technology’s Complex Flow and Heat Transfer Lab has made it easier for a submarine, or torpedo, to travel at extremely high speeds underwater. In theory, a supercavitating vessel could reach the speed of sound underwater, or about 5,800km/h, which would reduce the journey time for a transatlantic underwater cruise to less than an hour, and for a transpacific journey to about 100 minutes. However, supercavitation technology has faced two major problems. First, the submerged … Continue reading
I HAVE NO IDEA WHAT TIME IT IS. There are no windows in this office and no clock, only the blinking red LED display of a microwave, which flashes 12:00, 12:00, 12:00, 12:00. Joel and I have been programming for days. We have a bug, a stubborn demon of a bug. So the red pulse no-time feels right, like a read-out of our brains, which have somehow synchronized themselves at the same blink rate. But what if they select all the text and / hit Delete. / Damn! The NULL case! / And if not were out of the text field and they hit space / yeah, like for / … Continue reading
Like increasing numbers of low-income mothers and fathers, Ms. Navarro is at the center of a new collision that pits sophisticated workplace technology against some fundamental requirements of parenting, with particularly harsh consequences for poor single mothers. Along with virtually every major retail and restaurant chain, Starbucks relies on software that choreographs workers in precise, intricate ballets, using sales patterns and other data to determine which of its 130,000 baristas are needed in its thousands of locations and exactly when. Big-box retailers or mall clothing chains are now capable of bringing in more hands in anticipation of a delivery truck pulling in or the weather changing, and sending workers home … Continue reading
Sales of Fuel Cell sedan will begin in Japan before April 2015 where hydrogen stations are in place. Preparations are underway for sales to begin in the US and Europe during the summer of 2015. It is a vehicle equipped with a “Fuel Cell” that generates electricity through the chemical reaction between hydrogen and oxygen to power the motor driving the vehicle. Hydrogen, which replaces gasoline as fuel, is an environment-friendly energy source that can be produced from various raw materials.
三菱重工業は、防衛省の委託を受けて研究開発を進めているステルス戦闘機の試作機を、来年１月に初飛行させる方針を固めた。国内企業による初のステルス戦闘機開発で、防衛省は性能やコストを確認した上で、実用化するかどうか２０１８年度までに最終判断する方針だ。 ステルス機は中国やロシアが既に試作機を飛行させるなど開発を進めている。日本も０９年に、世界最高のステルス性を備えた米国のＦ２２の導入を目指したが、情報流出を警戒する米国の禁輸措置で断念した。このため、防衛力の強化には独自技術の蓄積が必要と判断。国内企業の戦闘機生産も、日米で共同開発した戦闘機Ｆ２全９４機の生産が１１年に完了してから途絶えており、国内防衛産業の生産基盤や技術の維持、向上を図る狙いもある。 政府は００年度以降、ステルス技術の研究に着手。０９年度からは、総事業費３９２億円をかけて試作機の開発を進めていた。試作機のステルス関連技術はすべて三菱重工業など国内企業が開発。敵のレーダーから届いた電波を真っすぐに反射して探知されないよう、機体や外板接合面の形状を設計した。 航空自衛隊に配備予定の最新鋭ステルス機Ｆ３５（米ロッキード・マーチン社製）はレーダー上で直径１０センチほどの物体として認識されるとされ、試作機もこれと同水準の性能を目指している。ＩＨＩや富士重工業なども、エンジンや主翼などの主要部材を受け持つ。 三菱重工がエンジンやシステムの作動テスト、基本的な飛行試験などを行った上で、来年３月末までに防衛省に機体を引き渡す。同省は１５年度から２年間かけて実戦を想定した試験飛行を重ね、ステルス性や飛行性能を詳しく検証する方針。航空自衛隊が保有する戦闘機のうち、Ｆ２が３０年代ごろから退役するため、後継機の選択肢に国産ステルス機を加えたい考えだ。
The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it.
paizaとは、オンラインのコーディングテストを受ける事で、書類選考なしに面接・会社見学可能な求人企業が見つかる転職サービスです。paizaのコーディングテストは Java, C, C++, C#, PHP, Ruby, Python, Perl に対応しており、より実務に近い試験になっています。 IT/WEB開発エンジニアに特化 エンジニアとしてスペシャリストキャリアを目指す方に特化した求人サービスを展開。 コーディング力をスコアリング Paizaのコーディングチャレンジでスキルをスコア評価。スキルの強化ポイントを把握。 効率的なマッチングの仕組み コーディング評価結果を元に、求人企業様が求めるスキル基準と効率的にマッチング。
DatabaseとGeometry(幾何学)の頭文字をとってデージー・テクノロジーズとしたのが当社の由来です。 『ビジネスアプリによるデータ処理「D」と、CADの図形処理「G」 というふたつのIT分野に特化して会社を運営したい』という思いが込められています。 弊社ではオブジェクト指向技術に基づいたシステム実装技術を得意としており、 多くのプロジェクトで大手企業からも高い評価を得てまいりました。 日本のIT産業において高まる開発案件の需要に対応すべく、2012年度までの5年計画として １>受託開発体制の強化 ２>アウトソーシング事業の確立 ３>革新的パッケージの開発 これら三本の事業柱を加速度的に成長させます。 得られた財政基盤を基に、新規事業にも積極的に投資していきます。
iPad User Guide (PDF)
3D Printed Metal Gun by Solid Concepts
Weighing only 16 grams, the Black Hornet looks like a tiny toy helicopter. But it’s really a nano-size piece of military hardware unlike anything on the battlefield today — experimental robot flies and hummingbirds not withstanding. The PD-100 Black Hornet Personal Reconnaissance System, unveiled to the American public for the first time last week at the Association of the United States Army Expo in Washington, D.C., is a drone (actually, a pair of them) that a soldier can carry and operate as easily as he or she would a radio.
Successful testing yesterday with our Quantum Stealth (light bending material) covering a UAV (Unmanned Aerial Vehicle). The UAV was able to taking off, fly a course at high speed, return back and land, repeating these tasks multiple times without any apparent change in the flight characteristics of the UAV. Currently only special authorized groups in the Canadian and U.S. militaries have access to the material and Quantum Stealth has been classified by both countries …
Mriya has set up 240 world records including transportation of the heaviest cargo with mass of 253 tons, the heaviest single peace of cargo with mass of 186,7 t as well as the longest cargo having length of 42,1 m. But the main thing is that Mriya serves people reliably. The airplane repeatedly participated in humanitarian operations. Thus in October, 2009 the AN-225 performed several flights on delivery generators to Samoa. They were necessary for renewal of work of Satala electric station damaged by tsunami. Only spacious cabin of the AN-225 could accommodate ten 12-tons generators at once. Each of them was as large as 6-meters container.
In the end, the location of the new economy is not in the technology, be it the microchip or the global telecommunications network. It is in the human mind. You can’t judge great teachers by their looks. Or their English. Or their profession. Or their education. Or where they were born, where they live, how they dress, how much money they make.
We have one billion users of Office. You can’t expect them to change every day.
Every day, millions of office workers prepare memos and reports using scissors and paste, and store data on floppy disks, though they have plenty of digital memory in their computers and the cloud. Smartphone-toting executives have their mail dumped into in-boxes, one corporate message atop another. They are not using these objects, of course, but clicking on the pictures of them in popular word-processing programs like Microsoft Word or Google Docs. The icons linger like vestigial organs of an old-style office, 31 years after IBM’s personal computer brought work into the software age. They symbolize an old style of office software, built for the time when the desktop computer was … Continue reading
Space has been expanding since the Big Bang 13.7 billion years ago. And we know that when you look at some of the cosmology models, there were early periods of the universe where there was explosive inflation, where two points would’ve went receding away from each other at very rapid speeds. Nature can do it. So the question is, can we do it?
Russia’s Proton rocket crashed less than a minute after its liftoff from Baikonur, Kazakhstan on July 2, 2013. The rocket started veering off course right after leaving the pad, deviating from the vertical path in various directions and then plunged to the ground seconds later nose first. The payload section and the upper stage were sheered off the vehicle moments before it impacted the ground and exploded. By July 9, it is transpired that investigators sifting through the wreckage of the doomed rocket had found critical angular velocity sensors, DUS, installed upside down. Each of those sensors had an arrow that was suppose to point toward the top of the … Continue reading
(Your novel raises the question of whether technology will save us or destroy us. Which do you believe?) I believe science will save us…although I tend to be an optimist. Obviously, science has wonderful potential to control disease, create new fuel supplies, engineer efficient food sources, and even allow us to migrate to new worlds. The problem, of course, is that every technology is a double-edged sword. The rocket engine that carries the space shuttle can also carry warheads. The medical breakthroughs that can eradicate disease–genetic research, for example-if misused, can bring about the end of the human race. The question is not whether or not science will expand to … Continue reading
Recent studies on the functional morphology of fins of fishes show a surprising biomechanical effect of the fin rays. The bionic implementations of these constructions led to shape-adaptive wing profiles and flow control devices. The functional principle has been patented as “Fin Ray Effect” and a line of products based on this effect is currently being developed.
The U.S. Army Research Laboratory’s (ARL), Army Research Office’s (ARO) initial concept of exploring DNA as a tagging and tracking method has led to the discovery of an optical scanning technology that can identify counterfeit electronic components before they are integrated into Army materiel. The technology also provides the capability to identify and track materiel in the absence of external tags or barcodes. This timely discovery will help address a significant challenge within the Army and DoD: the presence of counterfeit electronic components in military equipment.
New modifications include the newly rolled-out Phazotron Zhuk-AE active electronically scanned array (AESA) radar. The Phazotron Zhuk-AE AESA radar offers a wider range of operating frequencies, providing more resistance to electronic countermeasures (ECM), more detection range, more air and ground targets detected, tracked and able to be engaged simultaneously. The radar is thought to have detection range of 160 km (86 nmi) for air targets and 300 km (160 nmi) for ships.
Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance – better known as C4ISR. From leading-edge microelectronics to the largest, most complex system-of-systems in the world, Northrop Grumman’s C4ISR breadth, depth and ability provides first responders, intelligence gatherers, decision-makers and military personnel on the front lines the tools necessary to act with speed and confidence.
Aerial combat in the coming decades will be dominated by players who have command of information over their opponents, and are able to exploit that advantage offensively. Information has become the new high ground in the game of aerial combat. Globally, and especially in Asia, this has been reflected by sustained high levels of investment in capabilities historically operated only the US and NATO nations, such as AWACS/AEW&C and networking of combat aircraft, AWACS/AEW&C and ground based surveillance systems. Concurrently we have observed strong investment in counter-ISR systems, intended to render AWACS/AEW&C impotent. Such systems include very long range air to air missiles such as the Russian R-37/AA-13 Arrow and … Continue reading
Italy’s 5-Star Movement, led by comic Beppe Grillo, wants to scrap the country’s planned purchase of 90 Lockheed Martin Corp F-35 fighter jets and use the savings to help boost the struggling economy. Eliminating the purchase of the fighter jets would save Italy a total of an estimated 10 billion euros but it would leave the Air Force and the country’s new aircraft carrier with an outdated fighter fleet. The troubled F-35 is seven years behind schedule and 70 percent over early cost estimates, and orders for the super technological new jet have been cut during an economic crisis that has shrunk defence budgets worldwide. Last year, Italy cut its … Continue reading
We initially planned for a nine-month mission, which we are roughly at now, but we will continue to extend the mission as circumstances allow. Keeping the X-37 in orbit will provide us with additional experimentation opportunities and allow us to extract the maximum value out of the mission. We are learning new things about the vehicle every day, which makes the mission a very dynamic process.
Google Glass consists of a small display situated on a frame that resembles eyeglasses. It is connected to a camera, microphone and bone-conducting speaker. Glass pairs with your smartphone wirelessly using Bluetooth, but also can use Wi-Fi to access the Internet. You can use your voice or your finger to get it to take photos, record video, initiate video or voice chats, send messages, search Google and translate words or phrases. Google’s being a bit coy about the ship date for this groundbreaking wearable computer. However, while qualifying early adopters are paying $1,500 a pop for the privilege of owning it first, we’re told that it will become more widely … Continue reading
クロスループは、インストールして接続ボタンを押すだけで、どんなに離れていてもインターネットが接続されていれば画面共有を行い、相手の画面上から相手のパソコンを操作する事が出来るようになるソフトウェアです。 主に現在は、仕事上、家族同士や友人同士のパソコンサポート用に利用されていますが、何にご使用いただくかはお客様のアイデア次第です。 使用可能な言語は日本語を含め、21あり、190カ国の皆様にご使用頂いています。 また画面共有に使用される通信は128ビットのBlowfish技術を用いて暗号化されていますので、また起動のたびに、アクセスコードが変わり、そのアクセスコードを相手に教えないと接続出来ないしくみとなっていますので、セキュリティは万全です。 また、ポートの開放は不要です。
YouTube: GeekWire: Microsoft Research Transparent Display PDF: Jinha Lee, Cati Boulanger, Direct Spatial Interactions with See-Through 3D Desktop
The Petabyte Age is different because more is different. Kilobytes were stored on floppy disks. Megabytes were stored on hard disks. Terabytes were stored in disk arrays. Petabytes are stored in the cloud. As we moved along that progression, we went from the folder analogy to the file cabinet analogy to the library analogy to — well, at petabytes we ran out of organizational analogies. At the petabyte scale, information is not a matter of simple three- and four-dimensional taxonomy and order but of dimensionally agnostic statistics. It calls for an entirely different approach, one that requires us to lose the tether of data as something that can be visualized … Continue reading
Exponentially growing technologies Dynamic RAM size (smallest feature sizes decreasing exponentially) Dynamic RAM price performance (improving exponentially) Average Transistor price (decreasing exponentially) Transistor Manufacturing costs (decreasing exponentially) Microprocessor clock speeds (increasing exponentially) Microprocessor costs (decreasing exponentially) Transistors per microprocessor (increasing exponentially) Processor performance (increasing exponentially) DNA sequencing costs per base pair (decreasing exponentially) Random Access Memory bits per dollar (increasing exponentially) Magnetic data storage bits per dollar (increasing exponentially) Wireless Internet and phone services price performance (increasing exponentially) Number of Internet hosts (increasing exponentially) Bytes of Internet traffic (increasing exponentially) Internet backbone bandwidth (increasing in a very terraced, quasi-exponential manner) Mechanical device sizes (decreasing exponentially) Number of scientific citations for … Continue reading
PANAFACOM U-200 16-bit CPU with proprietary architecture Magnetic core, IC memory (8-64KB)
Betty Snyder/Holberton, Kay McNulty/Antonelli, Marlyn Wescoff/Wescoff, Ruth Lichterman/Teitelbaum, Betty Jean Jennings/Bartik, Fran Bila/Spence
Are all small gadgets worthless? No, but I do hope that in the future manufactures will make functionality a higher priority and focus less on saving a few centimeters here and there. Gadgets like cell phones do need to be small, but not so tiny that they lose in practicality what they gain in portability. If an item fits comfortably into a pocket, then most of us aren’t going to be overly eager to downsize based solely on size if it costs us features. So hopefully the trend of making tiny gadgets just for the sake of simply doing so will end, and going forward, manufactures will find ways to … Continue reading
Is it possible that our technological reach is very nearly sufficient now? That our lives, at least in the West, are sufficiently comfortable. What will you have done to your newborn when you have installed into the nucleus of every one of her billions of cells a purchased code that will pump out proteins designed to change her? You will have robbed her of the last possible chance for creating context—meaning—for her life. Say she finds herself, at the age of sixteen, unaccountably happy. Is it her being happy—finding, perhaps, the boy she will first love—or is it the corporate product inserted within her when she was a small nest … Continue reading
The Army’s Training and Doctrine Command (TRADOC) is drafting a new field manual for “Cyber-Electromagnetic Activity,” CEMA, a concept that joins the two functions at the hip. A new Army school at Fort Sill, Oklahoma has so far trained almost 700 electronic warfare specialists — many of them combat veterans, ranging from young sergeants to, as of Jan. 1st, the field’s first full colonel — who will oversee not only traditional EW but also cyber operations, at least on the tactical level. In the new concept, once the sensors pick up an enemy transmission, “a commander has several options. He could have his SIGINT [signals intelligence] team exploit the signals, … Continue reading
Microsoft’s ascent to the top of the PC industry continued to cause great passions. If you had said, in 1987, that Intel and Microsoft would in a decade define the industry, most would have laughed. Intel was struggling to produce competitive RISC chips, and Microsoft had never written an operating system. But the answers to the questions: “Why did Microsoft win” and “Why did IBM lose” are really different. IBM had never met a competitor like Bill Gates before – one quite so ruthless and opportunistic. Gates fought hard and IBM couldn’t shake him off. But with or without OS/2, IBM could have outflanked him or even dispensed with the … Continue reading
Don Estridge saw the PC as more than a standalone computer. He correctly anticipated that the PC would become an intelligent workstation and many functions would be completed by a host plus a PC. Many groups in IBM feared that the PC business would harm the more profitable areas of IBM. IBM dragged its heels producing more powerful PCs because of this. The IBM PS/2 line of computers was a dismal failure because the prices were high and customers didn’t understand why a different bus architecture was needed. Microsoft let IBM sink many millions of dollars into OS/2 while Microsoft developed Windows. Even though many in the PC industry considered … Continue reading
There are sustaining innovations and there are disruptive innovations. A sustaining innovation tends to be an incremental improvement on current products or services and doesn’t affect existing markets. A disruptive innovation, however, displaces existing products or services and changes existing markets. All of us have experienced disruptive technologies. When I was a kid, I took pictures on 35mm films and developed them in a darkroom myself. Two years ago on Sandia Peak in Albuquerque, New Mexico, I was surprised to meet a guy who was still using a 35mm film camera. But the market nowadays is dominated by digital cameras. An example of disruptive innovation in IT was the displacement … Continue reading