EMP. The letters spell burnt out computers and other electrical systems and perhaps even a return to the dark ages if it were to mark the beginning of a nuclear war. But it doesn’t need to be that way. Once you understand EMP, you can take a few simple precautions to protect yourself and equipment from it. In fact, you can enjoy much of the “high tech” life style you’ve come accustomed to even after the use of a nuclear device has been used by terrorists—or there is an all-out WWIII.
EMP (Electro-Magnetic Pulse), also sometimes known as “NEMP” (Nuclear Electromagnetic Pulse), was kept secret from the public for a long time and was first discovered more or less by accident when US Military tests of nuclear weapons started knocking out phone banks and other equipment miles from ground zero.
EMP is no longer “top secret” but information about it is still a little sketchy and hard to come by. Adding to the problems is the fact that its effects are hard to predict; even electronics designers have to test their equipment in powerful EMP simulators before they can be sure it is really capable of with standing the effect.
EMP occurs with all nuclear explosions. With smaller explosions the effects are Read more…
Researchers at the University of Rochester recently demonstrated how beams of light can actually levitate nanoscale diamonds. And while they’re not actually suggesting that we construct a light-driven hoverboard made of the precious gems, the things we might be able to do with floating diamonds are pretty cool in their own right.
By shining a second light source on the diamonds and recording both their vibrations and the light these precious stones emit, it’s possible to create a quantum computer. Project leader Nick Vamivakas describes this possibility in a paper regarding the experiment:
“…in theory we could encode information in the vibrations of the diamonds and extract it using the light they emit. Levitating particles such as these could have advantages over other optomechanical oscillators that exist, as they are not attached to any large structures. This would mean they are Read more…
Robots will be patrolling cities by 2040 according to Professor Noel Sharkey, who predicts their tasks will include asking for ID, tasering and arresting suspects as well as crowd control.
In an article entitled 2084: Big robot is watching you, Sharkey, a robotics professor at the University of Sheffield, forecasts a world in which the jobs of surveillance, security and law enforcement have largely been handed over to artificial intelligence.
WIthin the next 30 years, Sharkey asserts that, “Humanoid walking robots would be more in use for crowd control at games, strikes and riots. Robots will patrol city centres and trouble spots where fights are likely to break out.”
“Robots will have reasonable speech perception and be able to ask questions and respond to answers. What is your ID number? What are you doing here? Move along. They may work in teams of tracked robots with non-lethal weapons (e.g. Tasers or nets) and be on call for Read more…
“Warning” If you, your kids or grand kids take pics from your phone—WATCH THIS!
This is truly alarming – please take the time to watch. At the end they’ll tell you how to set your phone so you don’t run this risk!
PLEASE PASS THIS INFO TO ANYONE YOU KNOW WHO TAKES PICTURES WITH THEIR CELL OR SMART PHONE AND POSTS THEM ONLINE.
I want everyone of you to watch this and then be sure to share with all your family and friends.
It’s REALLY important info, about what your posting things on your cell phones can do TO YOU!!!
Too much technology out there these days so beware………..
PLEASE TAKE THE TIME TO WATCH THIS VIDEO, AND TAKE THE RECOMMENDED PRECAUTIONS.
If you have children or grandchildren you NEED to watch this. I had no idea this could happen from taking pictures on the blackberry or cell phone. It’s scary.
August 9, 2013 -
Biometrics Research Group, Inc. has observed that national security and military applications are driving a large proportion of “Big Data” research spending.
Big Data is a term used to describe large and complex data sets that can provide insightful conclusions when analyzed and visualized in a meaningful way. Conventional database tools do not have capabilities to manage large volumes of unstructured data. The U.S. Government is therefore investing in programs to develop new tools and technologies to manage highly complex data. The basic components of Big Data include hardware, software, services and storage.
Biometrics Research Group estimates that federal agencies spent approximately US$5 billion on Big Data resources in the 2012 fiscal year. We estimate that annual spending will grow to Read more…
By Aaron Dykes and Melissa Melton
“A tormenting thought: as of a certain point, history was no longer real. Without noticing it, all mankind suddenly left reality.” -Elias Canetti, Nobel Laureate in literature
As more and more information is released via National Security Administration whistleblower Edward Snowden, many Americans drifting through each day blissfully unaware of what country they really live in have had the curtain pulled back just enough to be fed their first spoonful of reality…it’s a bitter taste.
The clip below is of a public service message warning the public on the growing use of technology and surveillance by government and corporations (though who can really tell the difference these days) to control our lives.
Sure, you say. We know all about that. Snowden has conclusively shown us with leaked documentation what our government is doing to us.
Ah. But the film was not made last week or even last decade; it was filmed in 1974.
Watch and listen. No, really listen. This message isn’t just to warn us about the coming technological surveillance state itself, but how its construct is to Read more…
“We have developed so called brain-computer interfaces which allow the user to control different devices and programmes without hands, by means of the user’s thoughts.”
That is how Christoph Hintermüller of the Project Management and Research team at g.tec Guger Technologies sums up a machine which can quite literally read the mind.
It is intended for disabled patients, and the system made up of electrodes which sit on the scalp translates user intentions into electronic commands.
“A brain-computer interface captures various electrical impulses from the head of the user, and decodes them into specific tasks and actions,” continued Christoph Hintermüller.
That allows the user to play an online computer game, hands-free. The user selects the commands by simply looking at the blinking arrows on the screen. The frequency of the flashing is reproduced in Read more…
Biometrics Research Group, Inc. expects that biometrics will become integrated within a wide number of mobile devices in the near future. Integration will be driven by smartphone and tablet manufacturers such as Apple and Samsung Electronics, which we expect will add both fingerprint and gesture recognition functionality to their mobile devices within the next year.
In January, at the Consumer Electronics Show, a Samsung Android phone was demonstrated which included a fingerprint sensor underneath its screen. Developed by Validity, a firm that creates biometric authentication solutions for mobile devices, the sensor allowed a user to log into an Android-based smartphone with a single swipe of a finger. Using a fingerprint authentication system entitled “Natural Login”, Validity will not only enable security access to mobile devices, but will also allow validation of e-commerce transactions.
As extensively reported in BiometricUpdate.com, Apple is also undertaking incorporation of biometric technologies into its devices. Apple entered into an Read more…
It is possible to tell who a person is thinking about by analyzing images of his or her brain. Our mental models of people produce unique patterns of brain activation, which can be detected using advanced imaging techniques according to a study by Cornell University neuroscientist Nathan Spreng and his colleagues.
“When we looked at our data, we were shocked that we could successfully decode who our participants were thinking about based on their brain activity,” said Spreng, assistant professor of human development in Cornell’s College of Human Ecology.
Understanding and predicting the behavior of others is a key to successfully navigating the social world, yet little is known about how the brain actually models the Read more…