<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8291691543002294042</id><updated>2024-12-18T22:25:13.851-05:00</updated><title type='text'>Enbody on Computing</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default?start-index=26&amp;max-results=25'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>51</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-2272176657178098687</id><published>2016-09-30T08:56:00.000-04:00</published><updated>2016-09-30T08:56:03.671-04:00</updated><title type='text'>Next in tech?</title><content type='html'>How does a company like Google stay competitive as its core business of web advertising change? &amp;nbsp;One possibility is to combine its vast knowledge gained from watching searches for 17 years with AI (artificial intelligence) to create a device that can &quot;do things&quot; rather than simply search. &amp;nbsp;It began with the ability to answer questions as an extension of search. &amp;nbsp;The new goal is to consider all the parameters and book the flight you want, i.e. figure it all out. &amp;nbsp;Or combine with others to schedule a meeting without human intervention. &amp;nbsp;&lt;a href=&quot;http://www.nytimes.com/2016/09/29/technology/google-assistant.html?ref=technology&amp;amp;_r=0&quot;&gt;http://www.nytimes.com/&lt;/a&gt;&amp;nbsp; If you have sold your soul to Google so that it knows everything about you, e.g. through that Android phone you are carrying around, try stretching the abilities of Google Now -- it is impressively capable at successfully responding to spoken questions.</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/2272176657178098687/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/09/next-in-tech.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/2272176657178098687'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/2272176657178098687'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/09/next-in-tech.html' title='Next in tech?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-9009566425594501329</id><published>2016-09-25T08:59:00.002-04:00</published><updated>2016-09-25T08:59:52.997-04:00</updated><title type='text'>Secure Software</title><content type='html'>&lt;div class=&quot;p1&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;We have known for a long time that formal verification was possible in small pieces of code — that is, provably correct code (no bugs). &amp;nbsp;Well, embedded systems tend to have small code. &amp;nbsp;As a result, DARPA is finding success from a security standpoint in formally verified code. &amp;nbsp;The scenario is a formally verified helicopter delivery drone that attackers were unable to compromise even after providing exceptional access. &amp;nbsp;The article is nice because it explains the success and challenges. &amp;nbsp;It is entirely possible that embedded security such as vehicle security will be formal verification.&amp;nbsp;&lt;a href=&quot;https://www.wired.com/2016/09/computer-scientists-close-perfect-hack-proof-code/&quot;&gt;https://www.wired.com/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;br /&gt;&lt;span class=&quot;s1&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;p2&quot;&gt;
&lt;span class=&quot;s1&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;p1&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/9009566425594501329/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/09/secure-software.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/9009566425594501329'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/9009566425594501329'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/09/secure-software.html' title='Secure Software'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-4949996747352275801</id><published>2016-09-23T16:14:00.002-04:00</published><updated>2016-09-23T16:14:44.314-04:00</updated><title type='text'>Exoskeleton</title><content type='html'>Here is a different take on an exoskeleton from the Swiss Federal Institute of Technology in Zurich Switzerland:&amp;nbsp;&lt;a href=&quot;https://www.ethz.ch/content/main/en/news-und-veranstaltungen/eth-news/news/2016/09/hirn-an-roboter-bitte-bewegen.html&quot;&gt;https://www.ethz.ch/&lt;/a&gt;&amp;nbsp; They wrap an exoskeleton around limbs with limited functionality and control them using a patient&#39;s own brain. &amp;nbsp;The example used here wraps the exoskeleton around the back of a hand allowing the hand to do the grasping assisted by the robot.</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/4949996747352275801/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/09/exoskeleton.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/4949996747352275801'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/4949996747352275801'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/09/exoskeleton.html' title='Exoskeleton'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-3564740279859935548</id><published>2016-09-21T17:01:00.002-04:00</published><updated>2016-09-22T16:31:36.001-04:00</updated><title type='text'>Tera-bit Internet</title><content type='html'>Nokia claims it will demonstrate tera-bit internet (&lt;a href=&quot;http://www.zdnet.com/article/think-google-fibers-fast-nokia-to-show-off-tech-thats-1000-times-faster/&quot;&gt;http://www.zdnet.com/&lt;/a&gt;). &amp;nbsp;That would be 1,000 times faster than Google fiber and 10 times faster (or more) than the current internet backbone. &amp;nbsp;One thing to note is that the fiber itself isn&#39;t changing. &amp;nbsp;A strand of fiber is basically as pure as possible so the changes come at the ends where you put (and take) signals on the fiber. &amp;nbsp;In this case, they are tuning multiple wavelengths to be more efficient so they can carry more information.</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/3564740279859935548/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/09/tera-bit-internet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/3564740279859935548'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/3564740279859935548'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/09/tera-bit-internet.html' title='Tera-bit Internet'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-9029630240395339143</id><published>2016-09-21T17:01:00.001-04:00</published><updated>2016-09-21T17:05:22.156-04:00</updated><title type='text'>Scanning + Computing reads ancient burned Biblical scroll</title><content type='html'>The video in this article (&lt;a href=&quot;http://gizmodo.com/wondergadget-allows-researchers-to-read-a-charred-bibli-1786824739&quot;&gt;http://gizmodo.com/&lt;/a&gt;) describes how scans are processed in software to extract readable text from a piece of charcoal that was once a Biblical scroll. &amp;nbsp;They first determined the layers that represented the rolled up scroll. &amp;nbsp;Because the ink was denser than the scroll skin the ink showed up as brighter pixels on the layers revealing characters.&lt;br /&gt;
&lt;br /&gt;
The text was Leviticus -- now the oldest version found. &amp;nbsp;Leviticus has such gems as &quot;love your neighbor as yourself,&quot; but also &quot;don&#39;t wear clothing made of two kinds of material&quot; and many other things not to do. &amp;nbsp;It also has a darker side when it was used to justify slavery.</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/9029630240395339143/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/09/scanning-computing-reads-ancient-burned.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/9029630240395339143'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/9029630240395339143'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/09/scanning-computing-reads-ancient-burned.html' title='Scanning + Computing reads ancient burned Biblical scroll'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-7291797170702939791</id><published>2016-09-19T15:22:00.002-04:00</published><updated>2016-09-19T15:22:58.234-04:00</updated><title type='text'>Hacking a secured iPhone</title><content type='html'>In the aftermath of the San Bernadino shootings last year the FBI was unable to hack past the security of an iPhone and demanded that Apple break their own security. &amp;nbsp;A security firm stepped forward and used a hardware attack to circumvent entry. &amp;nbsp;How did they do it? &amp;nbsp;Here is a high level description of what security researchers did -- likely similar to what the security firm did:&amp;nbsp;&lt;a href=&quot;http://www.bbc.com/news/technology-37407047&quot;&gt;http://www.bbc.com/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
The problem is that after too many failed attempts to enter a passcode the phone will permanently shut down. &amp;nbsp;The challenge is to remove the attempt limit so all possible passcodes can be tried -- the passcode on that phone was only 4 numbers (new phones require 6 which is considerably more guesses). &amp;nbsp;The trick was to find the memory chip that stored the count and replace it with a new chip with a zeroed count before the limit was reached (much harder to do than it sounds). &amp;nbsp;It is a laborious process, but it can be done.</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/7291797170702939791/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/09/hacking-secured-iphone.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/7291797170702939791'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/7291797170702939791'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/09/hacking-secured-iphone.html' title='Hacking a secured iPhone'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-3764507853335578416</id><published>2016-09-17T15:06:00.001-04:00</published><updated>2016-09-17T15:06:47.957-04:00</updated><title type='text'>Comparing an iPhone to the &quot;first&quot; supercomputer</title><content type='html'>&lt;span style=&quot;background-color: white; font-family: sans-serif; font-size: x-small; line-height: 19.5px;&quot;&gt;I just got an iPhone 7 (switched from Android) so phone computing power is on my mind.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: sans-serif; font-size: x-small; line-height: 19.5px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; font-family: sans-serif; font-size: x-small; line-height: 19.5px;&quot;&gt;Linpack is a set of linear algebra routines used frequently in scientific computing for decades so it provides a way to compare new computers to very old ones. &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: small; line-height: 19.5px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: small; line-height: 19.5px;&quot;&gt;
The Cray-1 supercomputer of 1979, sometimes referred to as the &quot;first&quot; supercomputer. It cost $9 million in 1979 dollars ($26 million today), had 1 MegaByte of memory, weighed 5.5 tons, and required 115 KWatts of power. &amp;nbsp;It ran the linpack benchmark at 3.4 Mflops (million floating point operations per second). &amp;nbsp;The iPhone 6+ ran linpack at 180 Mflops on similar data -- the phone actually runs faster on larger matrices. &amp;nbsp;So the iPhone 6 is roughly 60 times faster. &amp;nbsp;And it fits in your pocket.&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: small; line-height: 19.5px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; font-family: sans-serif; font-size: small; line-height: 19.5px;&quot;&gt;
The Cray-1 was a milestone for weather prediction because it was the first computer that could do a 24-hour weather prediction in less than 24 hours (only a little less so it still wasn&#39;t useful at first).&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/3764507853335578416/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/09/comparing-iphone-to-first-supercomputer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/3764507853335578416'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/3764507853335578416'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/09/comparing-iphone-to-first-supercomputer.html' title='Comparing an iPhone to the &quot;first&quot; supercomputer'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-2366181805702479319</id><published>2016-09-14T21:02:00.000-04:00</published><updated>2016-09-14T21:02:31.464-04:00</updated><title type='text'>ATM Skimmer</title><content type='html'>An ATM skimmer is a device that thieves attach to an ATM machine to read (&quot;skim&quot;) the magnetic stripe on the ATM card. &amp;nbsp;Usually they are installed on the outside of the ATM machine and a wary eye can spot them. &amp;nbsp;A new &quot;periscope&quot; skimmer has been found in the wild that is installed inside the ATM -- it requires the thief to have a key to open the ATM for installation. See&amp;nbsp;&lt;a href=&quot;http://krebsonsecurity.com/2016/09/secret-service-warns-of-periscope-skimmers/&quot;&gt;http://krebsonsecurity.com/&lt;/a&gt;&amp;nbsp;for details. &amp;nbsp;What can you do to defend yourself? &amp;nbsp;The skimmer cannot read the PIN you type in -- that is usually read with a tiny camera. &amp;nbsp;The defense is simple: use one hand to cover the PIN pad while you enter the PIN with the other hand. &amp;nbsp;Secondarily, be wary of ATM machines that are not owned by a bank -- try to use bank ATMs built into a wall.</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/2366181805702479319/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/09/atm-skimmer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/2366181805702479319'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/2366181805702479319'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/09/atm-skimmer.html' title='ATM Skimmer'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-6610416350592529830</id><published>2016-09-14T20:57:00.000-04:00</published><updated>2016-09-14T20:57:22.573-04:00</updated><title type='text'>Robots</title><content type='html'>IEEE regularly posts videos of robots &lt;a href=&quot;http://spectrum.ieee.org/automaton/robotics/humanoids/video-friday-atlas-balancing-drone-with-arms-racing-roomba/?utm_source=RoboticsNews&amp;amp;utm_medium=Newsletter&amp;amp;utm_campaign=RN09132016&quot;&gt;http://spectrum.ieee.org/&lt;/a&gt;&amp;nbsp; I find exoskeletons and prostheses fascinating. &amp;nbsp;Here is a video of a new leg prothesis from that site:&amp;nbsp;&lt;a href=&quot;https://www.youtube.com/watch?v=Rrwm6iMXhgM&quot;&gt;https://www.youtube.com&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/6610416350592529830/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/09/robots.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/6610416350592529830'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/6610416350592529830'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/09/robots.html' title='Robots'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-7557125310409982126</id><published>2016-09-05T20:48:00.001-04:00</published><updated>2016-09-05T20:48:43.695-04:00</updated><title type='text'>Teams</title><content type='html'>Most (all?) of you will work on teams in school and on the job. &amp;nbsp;What makes an effective team has been a vexing question. &amp;nbsp;Here is a long, but excellent article&amp;nbsp;&lt;a href=&quot;http://www.nytimes.com/2016/02/28/magazine/what-google-learned-from-its-quest-to-build-the-perfect-team.html&quot;&gt;http://www.nytimes.com/&lt;/a&gt;&amp;nbsp; Psychological safety is important -- feeling comfortable to express your ideas. &amp;nbsp;Also, the ability to feel empathy for others is important -- effectively what is called &quot;Emotional IQ&quot;.</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/7557125310409982126/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/09/teams.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/7557125310409982126'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/7557125310409982126'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/09/teams.html' title='Teams'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-4719896054981028049</id><published>2016-08-31T11:12:00.000-04:00</published><updated>2016-08-31T11:12:23.051-04:00</updated><title type='text'>Hardware hack</title><content type='html'>Most operating systems use a single bit to indicate whether a process is privileged (e.g. admin, root) or not. &amp;nbsp;If you can flip that bit, you can change a process from unprivileged (&#39;normal&#39;) to privileged (&#39;superman&#39;) giving you total access to a computer. &amp;nbsp; An attack named &quot;Rowhammer&quot; will hammer a row of bits in memory causing spillover into a neighboring row and flip bits. &amp;nbsp;By selectively choosing a row you can flip the &quot;privilege&quot; bit in a neighboring row. Here is a nice article describing Rowhammer and recent variants:&amp;nbsp;&lt;a href=&quot;https://www.wired.com/2016/08/new-form-hacking-breaks-ideas-computers-work/&quot;&gt;https://www.wired.com/&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/4719896054981028049/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/08/hardware-hack.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/4719896054981028049'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/4719896054981028049'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/08/hardware-hack.html' title='Hardware hack'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-5010765819698150790</id><published>2016-08-30T13:25:00.002-04:00</published><updated>2016-08-30T13:25:58.198-04:00</updated><title type='text'>Sensing key strokes remotely</title><content type='html'>Side channel attacks involve using indirect methods to extract data. &amp;nbsp;In this case, the researchers used perturbations of Wi-Fi signals from hand movement to accurately detect keys being typed -- allowing one to remotely detect typing, e.g. to steal passwords. &amp;nbsp;Similar attacks exist such as the rhythm of key strokes from key-clicking sounds or screen refreshes from key strokes. A summary can be found here:&amp;nbsp;&lt;a href=&quot;https://www.schneier.com/blog/archives/2016/08/keystroke_recog.html&quot;&gt;https://www.schneier.com/&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/5010765819698150790/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/08/sensing-key-strokes-remotely.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/5010765819698150790'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/5010765819698150790'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/08/sensing-key-strokes-remotely.html' title='Sensing key strokes remotely'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-3206334081399137535</id><published>2016-08-28T10:35:00.003-04:00</published><updated>2016-08-28T10:35:43.157-04:00</updated><title type='text'>How a computer adds</title><content type='html'>Addition is the basis of all arithmetic in a computer. &amp;nbsp;Subtraction is adding a negative number, multiplication is repeated addition, and division is a combination of the others. &amp;nbsp;Of course, a computer uses binary numbers (digits 0 and 1 rather than digits 0 through 9). &amp;nbsp;This video describes how a binary adder circuit can be built using dominoes -- mirroring what actually happens in a computer. &amp;nbsp;The result is an easy-to-grasp description of computer arithmetic: &amp;nbsp;&lt;a href=&quot;https://www.youtube.com/watch?v=lNuPy-r1GuQ&quot;&gt;https://www.youtube.com/&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/3206334081399137535/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/08/how-computer-adds.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/3206334081399137535'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/3206334081399137535'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/08/how-computer-adds.html' title='How a computer adds'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-2572300724200334444</id><published>2016-08-18T15:37:00.002-04:00</published><updated>2016-08-18T15:37:55.992-04:00</updated><title type='text'>Lidar on a chip</title><content type='html'>Autonomous vehicles use laser range finders (lidar) to map their surroundings, often combined with radar. &amp;nbsp;Radar units are relatively small and inexpensive with no moving parts, but lidar has tended to be large and expensive (e.g. $70,000) with moving parts (something to break down). &amp;nbsp;They are the large, rotating objects on autonomous vehicle roofs. &amp;nbsp;MIT working with DARPA has shrunk lidar to a chip with no moving parts and a projected cost of $10 each -- a massive improvement:&amp;nbsp;&lt;a href=&quot;http://spectrum.ieee.org/tech-talk/semiconductors/optoelectronics/mit-lidar-on-a-chip/?utm_source=RoboticsNews&amp;amp;utm_medium=Newsletter&amp;amp;utm_campaign=RN08162016&quot;&gt;http://spectrum.ieee.org/&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/2572300724200334444/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/08/lidar-on-chip.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/2572300724200334444'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/2572300724200334444'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/08/lidar-on-chip.html' title='Lidar on a chip'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-2606880216989368771</id><published>2016-08-12T12:17:00.002-04:00</published><updated>2016-08-12T12:17:48.704-04:00</updated><title type='text'>Spoofing GPS</title><content type='html'>I am interested in malicious interference in vehicles and a related issue is the spoofing of sensors that are increasing in vehicles. &amp;nbsp;GPS mapping is common and&amp;nbsp;&lt;a href=&quot;http://spectrum.ieee.org/telecom/security/protecting-gps-from-spoofers-is-critical-to-the-future-of-navigation?utm_source=TechAlert&amp;amp;utm_medium=Email&amp;amp;utm_campaign=TechAlert_08-11-16&amp;amp;bt_email=enbody@cse.msu.edu&amp;amp;bt_ts=1470920215367&quot;&gt;http://spectrum.ieee.org/&lt;/a&gt;&amp;nbsp;has an article on how to spoof GPS. &amp;nbsp;The short version is that a signal is broadcast that overrides the true signal -- the hard part is to do it in a way that cannot be easily detected by the GPS receiver. &amp;nbsp;Doing so involves manipulating the pseudo-random noise code (PNC) that is contained in the true GPS signal whose purpose is to distinguish among the multiple GPS satellites used for positioning.</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/2606880216989368771/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/08/spoofing-gps.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/2606880216989368771'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/2606880216989368771'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/08/spoofing-gps.html' title='Spoofing GPS'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-6080710612811572172</id><published>2016-08-12T10:18:00.001-04:00</published><updated>2016-08-12T10:18:14.771-04:00</updated><title type='text'>Quantum cryptographic communication</title><content type='html'>The word &quot;quantum&quot; gets attached to multiple, very different technologies related to cryptography leading to confusion. The main two to date are the quantum computer (which has the capability to crack the asymmetric cryptography that underpins the internet) and quantum key distribution (which uses quantum characteristics of photons to securely distribute a symmetric, cryptographic key over an optical fiber). &amp;nbsp;Now we have a third: quantum, cryptographically-secured communication. &amp;nbsp;Rather than simply sharing a key as in quantum key distribution, here an entangled photon is used a the key so an eavesdropper intercepting the key will disturb the key rendering the communication indecipherable to everyone, especially the eavesdropper. It is not an existing technology, but the target of recent NSF funding:&amp;nbsp;&lt;a href=&quot;http://www.nsf.gov/news/news_summ.jsp?cntn_id=189436&amp;amp;org=NSF&amp;amp;from=news&quot;&gt;http://www.nsf.gov/&lt;/a&gt;&amp;nbsp;</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/6080710612811572172/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/08/quantum-cryptographic-communication.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/6080710612811572172'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/6080710612811572172'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/08/quantum-cryptographic-communication.html' title='Quantum cryptographic communication'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-5331071623539801067</id><published>2016-08-05T11:08:00.002-04:00</published><updated>2016-08-05T11:08:54.388-04:00</updated><title type='text'>ATM hack using new EMV cards</title><content type='html'>The new credit cards in the US now have the EMV chips that have been common elsewhere. &amp;nbsp;They make transactions more secure than the old mag-stripe cards which were easier to duplicate. &amp;nbsp;However, they are not perfect. &amp;nbsp;In this attack the point-of-sale (POS) terminal has a &quot;shimmer&quot; installed inside it which sits between the credit card and the POS hardware -- the classic &quot;man-in-the-middle&quot; attack. At some distant location is an ATM machine with an &quot;out-of-order&quot; sign on it. &amp;nbsp;The ATM has a smartphone that the &quot;shimmer&quot; communicates with to share the information that it is snooping while the credit card&#39;s EMV chip at the POS terminal is communicating with the banking system. &amp;nbsp;The &quot;out-of-order&quot; ATM has a device to emulate the EMV&#39;s communication as well as mechanical servos to push buttons. &amp;nbsp;Using the information from the &quot;shimmer&quot; a transaction is approved, the servos push buttons, and ATM throws out cash. The link (&lt;a href=&quot;http://www.eweek.com/security/black-hat-atm-hacking-returns-for-emv-rapid7-demonstrates.html&quot;&gt;http://www.eweek.com/&lt;/a&gt;) includes a brief video of a demonstration.</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/5331071623539801067/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/08/atm-hack-using-new-emv-cards.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/5331071623539801067'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/5331071623539801067'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/08/atm-hack-using-new-emv-cards.html' title='ATM hack using new EMV cards'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-6631163924180547594</id><published>2016-08-05T10:50:00.002-04:00</published><updated>2016-08-05T10:50:13.415-04:00</updated><title type='text'>Hotel door locks can be hacked.</title><content type='html'>It has been known that one brand of hotel lock, Onity, could be easily hacked by plugging into its power port that&#39;s on every lock (&lt;a href=&quot;http://www.computerworld.com/article/2597490/security0/black-hat--hotel-keycard-lock-picking-in-less-time-than-it-takes-to-blink.html&quot;&gt;http://www.computerworld.com/&lt;/a&gt;). &amp;nbsp;At this year&#39;s Black Hat an upgraded attack can unlock all the doors in a hotel, including creating a maid&#39;s master card. &amp;nbsp;You scan one card to identify the fields and then brute force the relevant fields (&lt;a href=&quot;http://www.computerworld.com/article/3104586/security/6-device-can-break-into-hotel-rooms-and-infect-pos-systems.html&quot;&gt;http://www.computerworld.com/&lt;/a&gt;). &amp;nbsp;The solution is old-school: jamb a chair under the door knob or carry a door stop to jamb under the door.</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/6631163924180547594/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/08/hotel-door-locks-can-be-hacked.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/6631163924180547594'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/6631163924180547594'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/08/hotel-door-locks-can-be-hacked.html' title='Hotel door locks can be hacked.'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-4021584424128160828</id><published>2016-08-03T13:58:00.003-04:00</published><updated>2016-08-03T13:58:48.719-04:00</updated><title type='text'>How to Hack an Election</title><content type='html'>There is an interesting article in&amp;nbsp;&lt;a href=&quot;http://www.bloomberg.com/features/2016-how-to-hack-an-election/&quot;&gt;http://www.bloomberg.com/&lt;/a&gt;&amp;nbsp;on a guy who claims to have hacked a number of Central and South American elections. &amp;nbsp;Basically it is &quot;dirty tricks&quot; using 21st century technology: accessing opponent&#39;s data and communication, setting up rumor campaigns on Twitter, etc.</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/4021584424128160828/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/08/how-to-hack-election.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/4021584424128160828'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/4021584424128160828'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/08/how-to-hack-election.html' title='How to Hack an Election'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-7297889165391573002</id><published>2016-08-03T12:37:00.000-04:00</published><updated>2016-08-03T12:37:20.570-04:00</updated><title type='text'>NIST no longer recommends TFA on SMS</title><content type='html'>&quot;NIST no longer recommends TFA on SMS&quot; -- lots of acronyms! NIST is the National Institute of Standards and Technology. &amp;nbsp;TFA is two-factor authentication and SMS is the common way texting is done on a smartphone. &amp;nbsp;TFA requires a second item when logging in, e.g. for Gmail you enter your name and password which triggers Google to send a text (SMS) which a code that you also enter -- two factors: password and texted code. &amp;nbsp;In this way, if someone has stolen your password, they will be unable to log in unless they also stole and accessed your phone. &amp;nbsp;SMS fails in multiple ways. &amp;nbsp;One is a malware app on the phone. &amp;nbsp;Another is social engineering (conning) the phone company to yield access to the phone. &amp;nbsp;I believe that the latter has been more common than the former. &amp;nbsp;TFA can also be done with an authenticator app on the phone and that is still recommended by NIST. &amp;nbsp;For example, Google has an authenticator app.</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/7297889165391573002/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/08/nist-no-longer-recommends-tfa-on-sms.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/7297889165391573002'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/7297889165391573002'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/08/nist-no-longer-recommends-tfa-on-sms.html' title='NIST no longer recommends TFA on SMS'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-3040588983347922109</id><published>2016-08-02T20:35:00.002-04:00</published><updated>2016-08-02T20:35:45.855-04:00</updated><title type='text'>Don&#39;t change your passwords!</title><content type='html'>Growing research indicates that mandated, frequent password changes result in passwords that users create an algorithm for. &amp;nbsp;The end result is a predictable password that is easier to crack. &amp;nbsp;A nice overview is here:&amp;nbsp;&lt;a href=&quot;http://arstechnica.com/security/2016/08/frequent-password-changes-are-the-enemy-of-security-ftc-technologist-says/&quot;&gt;http://arstechnica.com/security/&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/3040588983347922109/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/08/dont-change-your-passwords.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/3040588983347922109'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/3040588983347922109'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/08/dont-change-your-passwords.html' title='Don&#39;t change your passwords!'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-271455701724295465</id><published>2016-07-21T13:19:00.000-04:00</published><updated>2016-07-21T13:19:03.771-04:00</updated><title type='text'>Recreating a dead man&#39;s finger for a fingerprint reader</title><content type='html'>Police asked Dr. Jain&#39;s PRIP lab in MSU&#39;s CSE Department to create a 3-D finger of a dead man so they could access his phone because they believe the phone has clues to who murdered him. &amp;nbsp;One challenge is that the fingerprint reader has a sensor to detect if the finger is live.&amp;nbsp;&lt;a href=&quot;http://fusion.net/story/327145/3d-print-dead-mans-fingers-to-unlock-his-phone/&quot;&gt;http://fusion.net/&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/271455701724295465/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/07/recreating-dead-mans-finger-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/271455701724295465'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/271455701724295465'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/07/recreating-dead-mans-finger-for.html' title='Recreating a dead man&#39;s finger for a fingerprint reader'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-4247712276555627274</id><published>2016-07-21T13:07:00.002-04:00</published><updated>2016-07-21T13:07:47.271-04:00</updated><title type='text'>Nanosecond</title><content type='html'>Here is a classic that I came across on the Internet. &amp;nbsp;I hadn&#39;t seen it in a long while: Admiral Grace Hopper explaining a nanosecond:&amp;nbsp;&lt;a href=&quot;https://www.youtube.com/watch?v=JEpsKnWZrJ8&quot;&gt;https://www.youtube.com&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/4247712276555627274/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/07/nanosecond.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/4247712276555627274'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/4247712276555627274'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/07/nanosecond.html' title='Nanosecond'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-9164104458573439326</id><published>2016-07-20T11:50:00.001-04:00</published><updated>2016-07-20T11:50:34.207-04:00</updated><title type='text'>Robotic touch</title><content type='html'>Computer vision has a long history, especially in CSE at MSU, and it is quite sophisticated, but touch will be needed to advance robotics (nice overview here:&amp;nbsp;&lt;a href=&quot;http://spectrum.ieee.org/automaton/robotics/robotics-hardware/why-tactile-intelligence-is-the-future-of-robotic-grasping/?utm_source=RoboticsNews&amp;amp;utm_medium=Newsletter&amp;amp;utm_campaign=RN07192016&quot;&gt;http://spectrum.ieee.org/&lt;/a&gt;). &amp;nbsp;As an example, check out this article (&lt;a href=&quot;http://spectrum.ieee.org/automaton/robotics/industrial-robots/team-delft-wins-amazon-picking-challenge/?utm_source=RoboticsNews&amp;amp;utm_medium=Newsletter&amp;amp;utm_campaign=RN07192016&quot;&gt;http://spectrum.ieee.org/&lt;/a&gt;)&amp;nbsp;on the recent Amazon picking challenge where a robot does the current human task of putting items on shelves or selecting from shelves to place in a bin (box). &amp;nbsp;The winner from Delft does a good job, but is quite slow. &amp;nbsp;A common way to pick an object is to use suction, but that doesn&#39;t work on everything so the Delft robot has a second grasping &quot;hand.&quot; &amp;nbsp;Amazon currently uses a lot of automation (check out the clever Kiva warehouse robots:&amp;nbsp;&lt;a href=&quot;https://www.youtube.com/watch?v=UtBa9yVZBJM&quot;&gt;https://www.youtube.com/&lt;/a&gt;), but they still need humans for picking. &amp;nbsp;Our robotic overloads can&#39;t replace that human task. Yet.</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/9164104458573439326/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/07/robotic-touch.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/9164104458573439326'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/9164104458573439326'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/07/robotic-touch.html' title='Robotic touch'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8291691543002294042.post-7050172951784740503</id><published>2016-07-14T14:06:00.002-04:00</published><updated>2016-07-14T14:06:32.963-04:00</updated><title type='text'>Carbon nanotube circuits</title><content type='html'>Current (FET) transistors have driven the computer age nearly since its inception. In spite of their death having been predicted many times, they are finally reaching their limits -- physics is a hard limit. &amp;nbsp;Transistors based on carbon nanotubes have been an elusive potential substitute. &amp;nbsp;This&amp;nbsp;&lt;a href=&quot;http://spectrum.ieee.org/semiconductors/devices/how-well-put-a-carbon-nanotube-computer-in-your-hand?utm_source=TechAlert++&amp;amp;utm_medium=Email&amp;amp;utm_campaign=TechAlert_07-14-16&amp;amp;bt_email=enbody@cse.msu.edu&amp;amp;bt_ts=1468508581804&quot;&gt;http://spectrum.ieee.org/&lt;/a&gt;&amp;nbsp;article gives a nice overview of the state of the art and indicates that significant progress is being made. &amp;nbsp;A small 178 transistor circuit that runs has been demonstrated -- even though small that is non-trivial. &amp;nbsp;One point confuses me: transistors have two properties, they are a switch and they amplify. &amp;nbsp;Amplification with carbon nanotubes has been an issue and is not mentioned in the article. &amp;nbsp;Is is so obviously solved that it need not be mentioned or is this optimistic article ignoring that point?&lt;a href=&quot;https://www.blogger.com/&quot;&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='https://enbody.blogspot.com/feeds/7050172951784740503/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://enbody.blogspot.com/2016/07/carbon-nanotube-circuits.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/7050172951784740503'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/8291691543002294042/posts/default/7050172951784740503'/><link rel='alternate' type='text/html' href='https://enbody.blogspot.com/2016/07/carbon-nanotube-circuits.html' title='Carbon nanotube circuits'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/05564384735015242821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>