Friday, 13 October 2017

Google X and the Science of Radical Creativity

Google X

Google X is empowering invention with bust of radical creativity

 

Google parent company Alphabet has a very special wing which is working on developing highly influential and quite unbelievable technology, product or service for all. This special wing is called Google X wing which brings together highly powerful minds in varied fields that have a common shared goal of developing solutions to the crucial problems plaguing modern society. In simple words this wing is a kind of Moonshot Factory whose solutions are nothing less than the science fiction.
 

What makes Google X so different from others?

 
Google X will comes as simply one such company where members are encourages to perform regular investigation in the absurd ideas which are permitted anywhere in the world. In this case ‘absurd ideas’ are limited to the science fiction and their task is to investigate whether it is possible to implement in modern day and how feasible will it be. Over the this wing has quietly investigation space elevators and cold fusion which are remarkable absurd ideas in reality but so much in the field of science fiction.

This Moonshot factory has tried and even abandoned wide range of projects over the years which ranges from the developing hoverboards with magnetic levitation technology to extremely cheap fuel from the sea weed. It has met with varied degree of success in different projects and one of its most notable and widely reported projects is self-driving cars. Apart from it it had made drones which can deliver aerodynamic packages and even designed such contact lenses which can measure glucose level from the diabetic person’s tears.
 

Google X is the need of the hour

 
The ideas followed or made into by Google X might appear to be farfetched or too random to show any worth to usual reader. But the engineers and brightest minds at this Moonshot factory adhere to a very simple and potent three part formula. At the very beginning they address a huge problem, secondly they do it by offering a radical solution and thirdly this is achieved by employing a feasible technology.
It is worth noting that Google has created the Google X wing to solve its own problems as there is already massive workforce to deal with it. Rather the Google X division is literary made with the aim of creating such companied which helps in changing the world we live in and become the next age- Google. This wing considers more than 100 such absurd ideas every year which encompasses varied areas like artificial intelligence, clean energy and much more.
 
Innovation powered by secrecy
 
The Google X wing innovation is powered by the highest level of secrecy. Google doesn’t ever share the allotted budget or the number of employees working in the Google X wing even to the investors. Journalists simply has no clue what’s happening behind the closed doors of the Google X wings but it is worth noting that this Moonshot Factory is led by the finest mind in their respective field who knows what they doing or dealing with.

Wednesday, 11 October 2017

Open Rotor Jet Engine That Could Revolutionize Air Travel

Open Rotor

A new design of with an open rotor jet engine is expected to revolutionize air travel

 
Aerospace will see a new egg shaped jet engine which has the potential to dramatically cut down the fuel consumption and simply change the scenario of modern air travel. This new technology or more importantly the new ‘open rotor’ prototype has been designed by a French engine maker going by the Safran and he is hoping to see them in action by the year 2030. This new technology based engine was developed in association with European Union and it is being tested currently at a French military based present near Marsellie. The Open Rotor engine technology simply bring out the usually hidden whirring part outside in order to capture more air and provide more powerful thrust to the plane.
 

How it works?

 
This new technology based engine design is expected to help in cutting down fuel consumption which will in turn help in reducing the air fares. This engine is designed like an elongated egg having two rows of blades present at the back end. This engine is designed with an aim of burning 15 percent lesser amount of fuel than the current generation of turbofan engines. Even the traditional technology used in the turbofan had improved significantly in the recent past but the prospects & potential of the new egg shaped engine is massive.

This newly engine will be placed right at the back of the airplane rather than being placed right under the wings which has been common place with today’s technology. It will also leave some room for the two rows carbon blades shaped like scimitar which will swirl in the opposite direction.
 

Tinkering with the traditional engine technology & design

 
This isn’t the first that people had decided to tinker with the traditional engine technology and design of our airplanes. In the 1980 a number of US engine makers worked on the unducted fans but this design and technology was dropped as the oil prices steeply declined. During that time airplane engines were considered to be extremely noisy. The current study and change in the popular engine design and technology is powered by the continuous rise in the energy costs and the impositions of different resolution for fewer emissions.

One of the researchers has stated that if we are looking forward to turn this engine into reality by 2030 then the development has begin from today. In case the oil prices ever jumped over $100 then the whole industry will get more interested in such a viable engine technology which reduces the amount of fuel consumption.

It shouldn’t come as a surprise that Rolls Royce has shown its interest in this new peculiar engine technology. A another question which is being thrown at the developers is how the passengers are going to react to find two find two naked engine right at the back of the airplane. Developers have no answer for it and this technology still has to be certified by the regulator before it debuts on the modern planes.

Tuesday, 10 October 2017

What are the Importance of IT Disaster Recovery Plan

No matter what industry you work in, you very likely rely on some form of information technology. When something goes wrong with your IT system, it can bring operations to an immediate stop. The Importance of IT Disaster Recovery for business is most evident after a disaster. Without a plan, a company in any industry risks losing massive amounts of money, taking hits to their reputation, and may even pass these risks onto customers or clients. Waiting until a disaster hits, however, is dangerous and risky. Many people believe that such things can not happen to them, but in reality, they can, and do happen to everybody. Recent storms and cyberattacks should be enough to convince you that you need a disaster recovery plan.

Recent Examples

The climate on this planet is undergoing massive changes. This has led to many costly natural disasters. Hurricane Sandy, for example, did $65 billion worth of damage, and that was, at its height, a Category 2 hurricane. More recent hurricanes, like Harvey and Irma, were significantly stronger and cost even more money. Only 30% of respondents to a survey conducted under the name “2013/2014 Information Governance Benchmarking Survey,” believed that their organization had sufficient systems as it relates to disaster and crisis recovery and management and business continuity. The National Small Business Association conducted a study in which they found that a vast majority (83%) of organizations still had no business continuity plan a year after Hurricane Sandy wreaked its havoc.

Being Prepared

Even if your organization understands the importance of a contingency plan, it can be hard to understand how to start creating one. It is especially difficult for those who have never had to deal with disaster recovery. These people are susceptible to thinking that they will never need to utilize such a plan. They may also simply have no idea exactly what to prepare for. Either way, having a plan is essential for all organizations, as it is guaranteed to save costs in the long run.

If no one in your organization has any experience with planning for disaster recovery, it is important to consult with someone who has. There are so many things that need to be considered in a contingency plan, and it can be impossible to cover all of the bases without any experience in doing so. Many people also have difficulty recognizing the difference when it comes to disaster recovery vs. business continuity. While a business continuity plan is often used in conjunction with a disaster recovery plan, they are separate plans. The business continuity plan should indicate how business will continue after a disaster. The disaster recovery plan deals specifically with IT.

Once there is a well thought out plan in place, and any previous gaps in the plan have been fixed, any organization will be able to recover from a disaster quickly and efficiently. This helps prevent financial loss and loss of reputation. It can also help reduce the risk of damage to equipment during a disaster, and protect the privacy of client records.

World’s Longest Running Synchrotron Light Experiment Reveals Long Term Behaviour Of Nuclear Waste Materials

Nuclear waste experiment
Longest ongoing synchrotron light experiment in the World unveils behaviour of nuclear waste materials that are long term

University of Sheffield researchers, in collaboration with the Diamond Light Source, are the forerunners in studying and understanding gradual transformations in nuclear waste materials. Their experiment just reached a major milestone of 1000 days which makes it the world’s longest running synchrotron light experiment.

Led by Dr Claire Corkhill from the University’s Department of Materials Science and Engineering, the research has utilised the world’s best facilities at the Diamond Light Source to study the long-term behaviour of cement materials used in nuclear waste disposal through the synchrotron experiment.

Dr Corkhill explained that these cements are used to securely lock away the radioactive elements present in nuclear waste for a time period of more than about 10,000 years, hence it is vital that the properties of these materials are accurately predicted in the future. She also added that the exclusive provision at Diamond has enabled them to follow this reaction in situ, for a period of 1000 days and the data received from this study is already helping them recognize exact phases that will securely and safely lock away radioactive elements in a time span of 1000 years’ which is something they would not have been able to determine otherwise.

Dr Corkhill also stated that she has definite plans to return to Diamond Light Source to investigate and observe the reaction of these particular phases with uranium, plutonium and technetium on a single beamline of the X-ray absorption spectroscopy.


The Director of the Immobilisation Science Laboratory and co-investigator of this particular research, Professor Neil Hyatt, said that they all are very enthusiastic to be chosen to partake in this synchrotron experiment as the first ever consumers, in this world’s best facility and capability and are grateful to the people at the Diamond Light Source, Dr Chiu Tang, Dr Sarah Day and Dr Claire Murray from I11 in particular, for all the support they provided in helping all their experiments seeing the light of day and for being the perfect curators of their samples for a period of 1000 days. He added that they were very pleased that this 1000 day milestone established firmly their long-term association between the University of Sheffield and the scientists present at the Diamond Light Source.

Dr Corkhill is, at present, keeping an eye on the alterations in eight nuclear waste cement materials by determining the high resolution diffraction patterns at Diamond Light Source on the I11-1 beamline. Diamond Light Source happens to be UK’s national synchrotron science facility which was financed as a joint venture by the UK Government with the help of the Science & Technology Facilities Council (STFC) in collaboration with the Wellcome Trust. Dr Corkhill’s results and findings are currently being utilised to provide support to the ongoing safety case development meant for the UK Government policy to get rid of nuclear waste in a disposal facility that is geologically deep.
Scientists at Diamond plan to construct five more beamlines for these synchrotron experiments by 2020. But for now, there are no plans to put a stop to this experiment and it will in all probability continue to break records until the materials don’t change anymore or the space is required by another space.

The Most Secure Way To Unlock Your Phone, Revealed

pattern lock
Unlock Devices – Shoulder Surfing Attacks
 
Researchers have warned that users should stop utilising patterns to unlock their devices. According to latest study it has been observed that it seems much easier for people to glance over your shoulder while the user unlock his phone and memorise a pattern than a passcode.

According to the researchers, the so-called `shoulder surfing attacks’ could be cool for a criminal to intend and execute, though the user can protect themselves by turning to a PIN code and on increasing its length from four digits to six. They acquired more than 1,000 volunteers to pose as attackers, challenging them to memorise a range to unlock authentications of four and six digit PINs and four-and six-length patterns with and without tracing lines, by observing a victim over their shoulder from a variety of angles.

The two handsets utilised in the study were the 5-inch Nexus 5 and 6-inch OnePlus One which according to the researchers were identical to a wide variety of displays and form factors available in the present market for Android as well as iPhone. Moreover the researchers also measured single and various views for the attacker with two different hand positions for the victim for single-handed thumb input as well as two-handed index-finger input.
 
PINs – Most Secure
 
They observed from the research that four-length patterns having visible lines had been quite easy to unlock owing to shoulder surfing than any other means to unlock authentication that was tested. Researchers from United States Naval Academy and the University of Maryland commented that they observed that PINs were the most secure to shoulder surfing attacks and though both types of pattern input were poor, patterns without lines provided greater security.

Moreover the length of the input also tends to have an impact and longer authentication seemed more secure to shoulder surging. In addition, if the attacker tends to have multiple-views of the authentication, then the performance of the attacker is greatly improved. During the experiments about 10.8% of six-digit PINs were successful to unlock after a single observation and this figure increased to 26.5% after two observations. Around 62.5% of six-length patterns having tracing lines on the other hand could unlock after a single observation which increased to 79.9% after two observations.
 
Shorter Patterns More Susceptible
 
About 35.3% of six-length patterns devoid of tracing lines could unlock after a single viewing which rose to 52.1% after two observations. The researchers stated that shorter patterns had been even more susceptible, adding that even individuals using fingerprint or face-scanning technology for the purpose to unlock their phones need to be wary of their discoveries.

They further stated that biometrics seems to be a promising advancement in mobile authentication, though they can be considers a reaauthenticator or a secondary-authentication device since individual tend to need to have a PIN or pattern which they could enter somewhat often owing to environmental impacts for instance, wet hands.

There are also instances of high false negatives rates linked with biometrics. Besides this user with biometrics tend to opt for weaker PINs in comparison to those without, signifying that the classical unlock authentication tends to be an important attack course going forward. From a separate research published earlier in the year, it was observed that most of the security device patterns can unlock within a span of five attempts.