Patrick Nelson

Author Archives: Patrick Nelson

New chemistry-based data storage would blow Moore’s Law out of the water

Molecular electronics, where charges move through tiny, sole molecules, could be the future of computing and, in particular, storage, some scientists say.Researchers at Arizona State University (ASU) point out that a molecule-level computing technique, if its development succeeds, would slam Gordon Moore’s 1965 prophesy — Moore's Law — that the number of transistors on a chip will double every year, and thus allow electronics to get proportionally smaller. In this case, hardware, including transistors, will conceivably fit on individual molecules, reducing chip sizes much more significantly than Moore ever envisaged.[ Now read: What is quantum computing (and why enterprises should care) ] “The intersection of physical and chemical properties occurring at the molecular scale” is now being explored, and shows promise, an ASU article says. The researchers think Moore’s miniaturization projections will be blown out of the water.To read this article in full, please click here

New chemistry-based data storage would blow Moore’s Law out of the water

Molecular electronics, where charges move through tiny, sole molecules, could be the future of computing and, in particular, storage, some scientists say.Researchers at Arizona State University (ASU) point out that a molecule-level computing technique, if its development succeeds, would slam Gordon Moore’s 1965 prophesy — Moore's Law — that the number of transistors on a chip will double every year, and thus allow electronics to get proportionally smaller. In this case, hardware, including transistors, will conceivably fit on individual molecules, reducing chip sizes much more significantly than Moore ever envisaged.[ Now read: What is quantum computing (and why enterprises should care) ] “The intersection of physical and chemical properties occurring at the molecular scale” is now being explored, and shows promise, an ASU article says. The researchers think Moore’s miniaturization projections will be blown out of the water.To read this article in full, please click here

Power over Wi-Fi: The end of IoT sensor batteries?

Harnessing energy inherent in Wi-Fi or Bluetooth radio waves to power remote, wireless, Internet of Things (IoT) sensors — and also communicate with the devices at the same time — is a big-ticket item on IoT want-lists. Advantages include no batteries, thus reducing costs, size and weight.The key to achieving it functionally, some scientists say, is in converting AC waveforms to DC voltage, combined with the use of new materials. Researchers at Massachusetts Institute of Technology, along with some collaborators, say they’ve made a breakthrough in this area. Interestingly, it also includes scaling potential.To read this article in full, please click here

Power over Wi-Fi: The end of IoT-sensor batteries?

Harnessing energy inherent in Wi-Fi or Bluetooth radio waves to power remote, wireless, Internet of Things (IoT) sensors — and also communicate with the devices at the same time — is a big-ticket item on IoT want-lists. Advantages include no batteries, thus reducing costs, size and weight.The key to achieving it functionally, some scientists say, is in converting AC waveforms to DC voltage, combined with the use of new materials. Researchers at Massachusetts Institute of Technology, along with some collaborators, say they’ve made a breakthrough in this area. Interestingly, it also includes scaling potential.To read this article in full, please click here

Power over Wi-Fi: The end of IoT-sensor batteries?

Harnessing energy inherent in Wi-Fi or Bluetooth radio waves to power remote, wireless, Internet of Things (IoT) sensors — and also communicate with the devices at the same time — is a big-ticket item on IoT want-lists. Advantages include no batteries, thus reducing costs, size and weight.The key to achieving it functionally, some scientists say, is in converting AC waveforms to DC voltage, combined with the use of new materials. Researchers at Massachusetts Institute of Technology, along with some collaborators, say they’ve made a breakthrough in this area. Interestingly, it also includes scaling potential.To read this article in full, please click here

That VPN may not be as secure as you think

If you’re a VPN subscriber and have ever wondered just how secure the supposedly encrypted pipe that you’re using through the internet is — and whether the anonymity promise made by the VPN provider is indeed protecting your privacy— well, your hunches may be correct. It turns out several of these connections are not secure.Academics say they’ve discovered a whopping 13 programming errors in 61 separate VPN systems tested recently. The configuration bungles “allowed Internet traffic to travel outside the encrypted connection,” the researchers say.The independent research group, made up of computer scientists from UC San Diego, UC Berkeley, University of Illinois at Chicago, and Spain’s Madrid Institute of Advanced Studies (IMDEA) with International Computer Science Institute, write in the Conversation this month, some of which is redistributed by Homeland Security Newswire, that six of 200 VPN services also scandalously monitored user traffic. That’s more serious than unintended leaks, the team explains — users trust providers not to snoop. The point of a VPN is to be private and not get monitored. VPN use ranges from companies protecting commercial secrets on public Wi-Fi to dissidents.To read this article in full, please click here

That VPN may not be as secure as you think

If you’re a VPN subscriber and have ever wondered just how secure the supposedly encrypted pipe that you’re using through the internet is — and whether the anonymity promise made by the VPN provider is indeed protecting your privacy— well, your hunches may be correct. It turns out several of these connections are not secure.Academics say they’ve discovered a whopping 13 programming errors in 61 separate VPN systems tested recently. The configuration bungles “allowed Internet traffic to travel outside the encrypted connection,” the researchers say.The independent research group, made up of computer scientists from UC San Diego, UC Berkeley, University of Illinois at Chicago, and Spain’s Madrid Institute of Advanced Studies (IMDEA) with International Computer Science Institute, write in the Conversation this month, some of which is redistributed by Homeland Security Newswire, that six of 200 VPN services also scandalously monitored user traffic. That’s more serious than unintended leaks, the team explains — users trust providers not to snoop. The point of a VPN is to be private and not get monitored. VPN use ranges from companies protecting commercial secrets on public Wi-Fi to dissidents.To read this article in full, please click here

That VPN may not be as secure as you think

If you’re a VPN subscriber and have ever wondered just how secure the supposedly encrypted pipe that you’re using through the internet is — and whether the anonymity promise made by the VPN provider is indeed protecting your privacy— well, your hunches may be correct. It turns out several of these connections are not secure.Academics say they’ve discovered a whopping 13 programming errors in 61 separate VPN systems tested recently. The configuration bungles “allowed Internet traffic to travel outside the encrypted connection,” the researchers say.The independent research group, made up of computer scientists from UC San Diego, UC Berkeley, University of Illinois at Chicago, and Spain’s Madrid Institute of Advanced Studies (IMDEA) with International Computer Science Institute, write in the Conversation this month, some of which is redistributed by Homeland Security Newswire, that six of 200 VPN services also scandalously monitored user traffic. That’s more serious than unintended leaks, the team explains — users trust providers not to snoop. The point of a VPN is to be private and not get monitored. VPN use ranges from companies protecting commercial secrets on public Wi-Fi to dissidents.To read this article in full, please click here

That VPN may not be as secure as you think

If you’re a VPN subscriber and have ever wondered just how secure the supposedly encrypted pipe that you’re using through the internet is — and whether the anonymity promise made by the VPN provider is indeed protecting your privacy— well, your hunches may be correct. It turns out several of these connections are not secure.Academics say they’ve discovered a whopping 13 programming errors in 61 separate VPN systems tested recently. The configuration bungles “allowed Internet traffic to travel outside the encrypted connection,” the researchers say.The independent research group, made up of computer scientists from UC San Diego, UC Berkeley, University of Illinois at Chicago, and Spain’s Madrid Institute of Advanced Studies (IMDEA) with International Computer Science Institute, write in the Conversation this month, some of which is redistributed by Homeland Security Newswire, that six of 200 VPN services also scandalously monitored user traffic. That’s more serious than unintended leaks, the team explains — users trust providers not to snoop. The point of a VPN is to be private and not get monitored. VPN use ranges from companies protecting commercial secrets on public Wi-Fi to dissidents.To read this article in full, please click here

Light-based computers to be 5,000 times faster

Electrical currents are best created using semiconductor crystals that absorb light, say researchers who have announced a significant, potential computer-speed breakthrough. The team obtained ultrafast clock rates in the terahertz of frequencies, using light. That is significantly higher than existing single-gigahertz computer clock rates.The “bursts of light contain frequencies that are 5,000 times higher than the highest clock rate of modern computer technology,” researchers at the Forschungsverbund research association in Germany announced in a press release last month. A chip's oscillating frequencies, called clock rate, is one measurement of speed.To read this article in full, please click here

Light-based computers to be 5,000 times faster

Electrical currents are best created using semiconductor crystals that absorb light, say researchers who have announced a significant, potential computer-speed breakthrough. The team obtained ultrafast clock rates in the terahertz of frequencies, using light. That is significantly higher than existing single-gigahertz computer clock rates.The “bursts of light contain frequencies that are 5,000 times higher than the highest clock rate of modern computer technology,” researchers at the Forschungsverbund research association in Germany announced in a press release last month. A chip's oscillating frequencies, called clock rate, is one measurement of speed.To read this article in full, please click here

Light-based computers to be 5,000 times faster

Electrical currents are best created using semiconductor crystals that absorb light, say researchers who have announced a significant, potential computer-speed breakthrough. The team obtained ultrafast clock rates in the terahertz of frequencies, using light. That is significantly higher than existing single-gigahertz computer clock rates.The “bursts of light contain frequencies that are 5,000 times higher than the highest clock rate of modern computer technology,” researchers at the Forschungsverbund research association in Germany announced in a press release last month. A chip's oscillating frequencies, called clock rate, is one measurement of speed.To read this article in full, please click here

DARPA explores new computer architectures to fix security between systems

Solutions are needed to replace the archaic air-gapping of computers used to isolate and protect sensitive defense information, the U.S. Government has decided. Air-gapping, used often now, is the practice of physically isolating data-storing computers from other systems, computers, and networks. It theoretically can’t be compromised because there is nothing between the machines — there are no links into the machines; they’re removed.However, many say air-gapping is no longer practical, as the cloud and internet takes a hold of massive swaths of data and communications.“Keeping a system completely disconnected from all means of information transfer is an unrealistic security tactic,” says Defense Advanced Research Projects Agency (DARPA) on its website, announcing an initiative to develop completely new hardware and software that will allow defense communications to take place securely among myriad existing systems, networks, and security protocols.To read this article in full, please click here

DARPA explores new computer architectures to fix security between systems

Solutions are needed to replace the archaic air-gapping of computers used to isolate and protect sensitive defense information, the U.S. Government has decided. Air-gapping, used often now, is the practice of physically isolating data-storing computers from other systems, computers, and networks. It theoretically can’t be compromised because there is nothing between the machines — there are no links into the machines; they’re removed.However, many say air-gapping is no longer practical, as the cloud and internet takes a hold of massive swaths of data and communications.“Keeping a system completely disconnected from all means of information transfer is an unrealistic security tactic,” says Defense Advanced Research Projects Agency (DARPA) on its website, announcing an initiative to develop completely new hardware and software that will allow defense communications to take place securely among myriad existing systems, networks, and security protocols.To read this article in full, please click here

DARPA explores new computer architectures to fix security between systems

Solutions are needed to replace the archaic air-gapping of computers used to isolate and protect sensitive defense information, the U.S. Government has decided.Air-gapping is the common practice of physically isolating data-storing computers from other systems, computers and networks so they theoretically can’t be compromised because there is nothing connecting the machines.[ Also read: What to consider when deploying a next generation firewall | Get regularly scheduled insights: Sign up for Network World newsletters ] However, many say air-gapping is no longer practical, as the cloud and internet take a hold of massive swaths of data and communications.To read this article in full, please click here

DARPA explores new computer architectures to fix security between systems

Solutions are needed to replace the archaic air-gapping of computers used to isolate and protect sensitive defense information, the U.S. Government has decided.Air-gapping is the common practice of physically isolating data-storing computers from other systems, computers and networks so they theoretically can’t be compromised because there is nothing connecting the machines.[ Also read: What to consider when deploying a next generation firewall | Get regularly scheduled insights: Sign up for Network World newsletters ] However, many say air-gapping is no longer practical, as the cloud and internet take a hold of massive swaths of data and communications.To read this article in full, please click here

Do frog croaks hold the key to creating the perfect IoT network?

Internet of Things (IoT) research firm Berg Insight recently released figures indicating the installed base of wireless IoT devices in industrial automation reached 21.3 million in 2018. That number could be 50.3 million connections by 2023, the company says. It’s a lot of new industrial wireless nodes coming, and potentially a lot of data packet collisions if the new networks aren’t thought out for handling a snowballing scale.Copying frogs is the answer, say researchers at Osaka University in Japan. They say they’ve discovered that the calling patterns of male Japanese tree frogs don’t overlap, and thus replicate how one would ideally like to see a network function — no packets crashing. The leaping amphibians collectively orchestrate their croaking and silences.To read this article in full, please click here

Do frog croaks hold the key to creating the perfect IoT network?

Internet of Things (IoT) research firm Berg Insight recently released figures indicating the installed base of wireless IoT devices in industrial automation reached 21.3 million in 2018. That number could be 50.3 million connections by 2023, the company says. It’s a lot of new industrial wireless nodes coming, and potentially a lot of data packet collisions if the new networks aren’t thought out for handling a snowballing scale.Copying frogs is the answer, say researchers at Osaka University in Japan. They say they’ve discovered that the calling patterns of male Japanese tree frogs don’t overlap, and thus replicate how one would ideally like to see a network function — no packets crashing. The leaping amphibians collectively orchestrate their croaking and silences.To read this article in full, please click here

Quantum-embedded chips could secure IoT

Microprocessors that are unique to each Internet of Things (IoT) device is the way forward in the ongoing and tricky quest to secure the IoT, says Crypto Quantique. One idea is that by making each chip one of a kind and unclonable, an application would become almost impossible to hack.The U.K.-based startup says it has introduced “the world's most advanced security product for IoT devices.” The microprocessor-based solution uses quantum physics, combined with cryptography, all embedded in silicon, it explained in a press release last October.To read this article in full, please click here

Quantum-embedded chips could secure IoT

Microprocessors that are unique to each Internet of Things (IoT) device is the way forward in the ongoing and tricky quest to secure the IoT, says Crypto Quantique. One idea is that by making each chip one of a kind and unclonable, an application would become almost impossible to hack.The U.K.-based startup says it has introduced “the world's most advanced security product for IoT devices.” The microprocessor-based solution uses quantum physics, combined with cryptography, all embedded in silicon, it explained in a press release last October.To read this article in full, please click here

1 4 5 6 7 8 31