-
Topics Cloud - Click To Browse
Electronics Environment Europe NanoTechnology Pesticides Pollution Research Rivers About Us (1)
Artificial Intelligence (3)
Arts & Literature (4)
Aviation (5)
Business (61)
Cyber Security (68)
Economy (107)
Energy (28)
Environment (14)
Featured (205)
Geopolitics (194)
Innovation (151)
Intelligence (25)
Military (82)
Mobility (34)
Movies (1)
NanoTechnology (9)
News (92)
Politics (121)
Risk (67)
Science (57)
Security (34)
Society (34)
Space (17)
Spotlight (300)
Technology (228)
Uncategorized (3)
WP Cumulus Flash tag cloud by Roy Tanck and Luke Morton requires Flash Player 9 or better.
-
Popular Posts
- It’s Alive: Latest Earthquakes in the World – Past 7 days from the USGS 14.8k views
- Self-sufficiency: The Politics of Iran’s Space Program 14.5k views
- Career Management: The most demanded Jobs in the next 20 years 13.7k views
- Engineering: Tokyo’s Skycrapers Moved but didn’t Collapse 12.6k views
- Stealth: A Modified Boeing-Sikorsky UH-60 Comanche? 11.8k views
- Apple: Designed in California – Assembled in China 11.6k views
- Interactive Map: Scientists Project Path of Radiation Plume 11k views
- US Air Force: The Quest for a Sixth Generation Fighter 10.8k views
- Mail Online: The Japanese road repaired SIX days after it was destroyed by quake 10.5k views
- NYT: Why We Travel or the Quest of the Self in Today’s World Turmoil 9.9k views
- GE Global 2012 Innovation Barometer: Between Perception and Reality 9.9k views
The Economist Daily Chart
-
QKD & Time-bin Quantum Photonic States: Creating & Distributing Encryption Codes on Larger Distances at Mps rates
With the advances in quantum computers, the end of encryption as we know it is near. Current cryptosystems, such as... -
Deep Learning & Natural Language: The Crime Scene Investigation Case
Researchers from the School of Informatics of the University of Edinburgh taught Neural Networks to analyse Datasets of the show... -
AI, Douglas Hofstadter and the Letter A: Vision, Recursive Cortical Network (RCN) & CAPTCHAs
A blog post from the AI company Vicarious, says that they have developed a computer model that can solve Completely... -
A New Deep Learning Theory: Compressing Noisy Data While Keeping Relevant Data
Naftali Tishby, a computer scientist and neuroscientist from the Hebrew University of Jerusalem, recently presented a theory to explain the learning... -
Crypto vs Quantum = Post-Quantum CRYPTOgraphyfor long-term security
Cordis: “When quantum computers become available, an existing algorithm will challenge current encryption techniques now considered secure. Work being done... -
Interscatter Wireless Communication: Connecting Powerless Contact Lenses and Credit Cards
UW: “University of Washington researchers have introduced a new way of communicating that allows devices such as brain implants, contact... -
Baldrige: NIST Unveils a Cybersecurity Self-Assessment Tool
The The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) unveiled a first draft of a security self-assessment tool... -
BYU: People disregard security warnings on computers because they come at bad times
BYU: ” A new study from BYU – Brigham Young University, in collaboration with Google Chrome engineers, finds the status quo... -
Power Grid: SANS details of the last Cyber Attack
Last December 23rd, about 700,000 Ukrainian customers lost power between 3 and 6 hours. The SANS Industrial Control System (ICS) team provided... -
One-Time Passwords: Images & Codes
Plymouth University: “A system using images and a one-time numerical code could provide a secure and easy to use alternative...
Cap Falcon |