When we tickle our artistic sides, playing with the varying fields of focus in our camera lenses can be a form of aesthetic expression. But for more practical uses -- say, filming a multi-layered scene like a concert where various subjects are at various depths -- it would be advantageous to capture the entire scene in perfect focus. A researcher in Toronto claims he's created an omni-focus camera that does exactly that.
There is a specter haunting Europe. Nope, not that one, but several European nations have expressed concern about Google’s slow but steady encroachment on citizens’ privacy protections. Now the search behemoth is in hot water with Germans for using its wandering Street View cars to log the location of private WLAN networks and media access control (MAC) addresses in that country.
More and more implantable devices, like pacemakers or defibrillators, are turning to wireless signals as a means to communicate with external devices, but in doing so they open themselves to security breaches. Several solutions are in the works that tackle this problem by upping device defenses, but by piling on security measures, yet another risk emerges: that at a critical time an authorized physician might not be able to access the device.
So Microsoft Research proposes putting a new technological spin on an old, time-tested security protocol: protect every device with a password, then tattoo the password right onto the patient in invisible UV ink.
By Arnie CooperPosted 04.10.2010 at 6:01 pm 0 Comments
When the “underwear bomber” passed through security last Christmas, no one noticed the three ounces of PETN, one of the most reactive explosives, stuffed in his pants. Now a new portable chemical detector, capable of sensing explosives’ vapor at parts per trillion, could finally uncover this and other chemical threats at airports.
One of the major problems with current cybersecurity measures is that while systems can detect the erratic behavior that heralds an incoming attack, there often isn't a whole lot those systems can do once the attack is underway short of pulling the servers offline, resulting in lost revenues and credibility for Web sites and a loss of key services for users. A new MIT system aims to change that by keeping servers and applications running even as it contains an incoming cyberattack.
A 2007 hacker attack on an Internet café in Hubei Province in China has led to the discovery and dismantling of an online hacker training camp accused of providing malicious software and lessons in hacker technique to tens of thousands of Chinese users.
Bringing a new connotation to the term "verbal contract," researchers at the Secure Information Technology wing over at Fraunhofer in Darmstadt, Germany have developed a means of creating secure, legally-binding phone archives, meaning two parties can "sign" a contract without ever putting ink to paper.
Bees need not recognize human faces when going about their pollination business. Yet scientists have now found that they can train bees to recognize the arrangement of human facial features, by rewarding the classy striped insects with sugar. That could inspire new facial recognition systems, given that bees manage this feat with brains the size of a microdot.