Archive

Posts Tagged ‘technology’

Are you ‘over-connected’?

March 12, 2015 Comments off

bbc.com

(Josh Pulman)

(Josh Pulman)

Wander the city in 2015 and all you’ll see is people staring at screens or talking on handsets. Is it changing who we are? Tom Chatfield weighs up the arguments.

A group of people wait by a monument, unaware of each other’s existence. A woman strides open-mouthed down a busy street, holding one hand across her heart. Two young men – brothers? – stand behind a white fence, both their heads bowed at the same angle.

These are some of the moments captured in photographer Josh Pulman’s ongoing series called Somewhere Else, which documents people using mobile phones in public places (see pictures). Almost every street in every city across the world is packed with people doing this – something that didn’t exist a few decades ago. We have grown accustomed to the fact that shared physical space no longer means shared experience. Everywhere we go, we carry with us options far more enticing than the place and moment we happen to be standing within: access to friends, family, news, views, scandals, celebrity, work, leisure, information, rumour.

I’m pouring my hours not simply into a screen, but the most comprehensive network of human minds ever — So why do we feel the urge to ‘detox’?

Little wonder that we are transfixed; that  Full Article Here

Our lives in 2025: What the world will be like in 10 years’ time

March 11, 2015 Comments off

Our world is being transformed by rapid advances in sciences and technology that are touching every aspect of our lives.

So what changes could these developments bring about for life as we know it? We only have to look around us to see just how much can change in a relatively short space of time.

Our lives have been shaped by developments which most of us couldn’t have imagined a decade ago. For example, handheld devices such as smartphones and tablets now allow us to have live video conversations with our friends, translate instantaneously between multiple languages, watch full length videos and monitor

Read more…

German Defense Minister von der Leyen’s fingerprint copied by Chaos Computer Club

December 31, 2014 Comments off

www.dw.de

A speaker at the yearly conference of the Chaos Computer Club has shown how fingerprints can be faked using only a few photographs. To demonstrate, he copied the thumbprint of the German defense minister.

Jan Krissler, also know by his alias “Starbug,” told a conference of hackers he has copied the thumbprint of German Defense Minister Ursula von der Leyen. Speaking at the 31st annual conference of the Chaos Computer Club in Hamburg, Krissler highlighted the dangers in relying on security technology.

Krissler explained that he didn’t even need an object that von der Leyen had touched to create the copy. Using several close-range photos in order to capture every angle, Krissler used a commercially available software called VeriFinger to create an image of the minister’s fingerprint.

Along with fellow hacker Tobias Fiebig, Krissler has been working at the Technical University of Berlin on research into weaknesses of

Read more…

An Inevitable Headache: US Allies Sell Defense Technology to China

December 23, 2013 Comments off

thediplomat.com

An Inevitable Headache: US Allies Sell Defense Technology to ChinaIf Edward Snowden’s revelations about the United States’ global surveillance activities taught U.S. allies anything, it’s that on the world stage, even your closest friends can’t be trusted. The United States has recently been feeling the sting in a similar way – not because of espionage, but because its allies are hemorrhaging valuable defense technology to China. Recent reports suggest that the United States’ European allies and Israel have exported or had made plans to export sensitive defense technology to China.

According to Reuters, “If the People’s Liberation Army went to war tomorrow, it would field an arsenal bristling with hardware from some of America’s closest allies: Germany, France and Britain.” Reuters substantiates this claim – Chinese advanced surface warships largely field French and German diesel engine designs under the hood; Chinese destroyers field French sonar technology, as do anti-submarine warfare (ASW) helicopters and surface-to-air missiles; British propulsion technology and airborne early warning radars can be found in several PLA fighters, bombers, and anti-ship aircraft. Additionally, “some of China’s best attack and transport helicopters rely on designs from Eurocopter, a subsidiary of pan-European aerospace and defense giant EADS.”

Israeli sources report that a top Israeli defense official was forced to Full Article Here

Chinese aggression aimed at US

December 23, 2013 Comments off

truthernews

henry-gruver-russian-invasion-of-america-last-daysSWITZERLAND, Zurich — In the very near future, the Chinese military will launch an unprovoked wave of attacks—starting with the islands of Japan and Hawaii and ending with twin nuclear detonations in the U.S. cities of San Francisco, California and Seattle, Washington.

The Chinese will start their attacks in the East and make their way West with the use of a radar cloaking technology which will render their drones, planes, ships and submarines invisible to U.S. military defense systems. Once in the clear, Chinese subs will likely launch a pair of unmanned drones which will be outfitted to carry nuclear warheads to their respective targets.

Download & Forward PDF

The notion of a Chinese nuclear attack on the United States was openly flaunted on October 31, 2013, when the Chinese government released a nuclear blast map projection for the U.S. cities of Seattle and Los Angeles, after they were struck by Chinese nuclear warheads (see photo below). A few weeks later on December 17, 2013, a Chinese rover diorama showed Europe being nuked, another ominous sign that a Chinese nuclear strike against the Full Article Here

Is your smartphone watching you?

August 17, 2013 Comments off

Protecting Yourself from EMP

August 16, 2013 Comments off

standeyo.com

EMP. The letters spell burnt out computers and other electrical systems and perhaps even a return to the dark ages if it were to mark the beginning of a nuclear war. But it doesn’t need to be that way. Once you understand EMP, you can take a few simple precautions to protect yourself and equipment from it. In fact, you can enjoy much of the “high tech” life style you’ve come accustomed to even after the use of a nuclear device has been used by terrorists—or there is an all-out WWIII.

EMP (Electro-Magnetic Pulse), also sometimes known as “NEMP” (Nuclear Electromagnetic Pulse), was kept secret from the public for a long time and was first discovered more or less by accident when US Military tests of nuclear weapons started knocking out phone banks and other equipment miles from ground zero.

EMP is no longer “top secret” but information about it is still a little sketchy and hard to come by. Adding to the problems is the fact that its effects are hard to predict; even electronics designers have to test their equipment in powerful EMP simulators before they can be sure it is really capable of with standing the effect.

EMP occurs with all nuclear explosions. With smaller explosions the effects are Read more…

Follow

Get every new post delivered to your Inbox.

Join 447 other followers