Archive for the 'tech' Category

Chips Off the Old Block: Computers Are Taking Design Cues From Human Brains – The New York Times

September 22, 2017

Computers Are Taking Design Cues From…Brains
https://www.NYTimes.com/2017/09/16/technology/chips-off-the-old-block-computers-are-taking-design-cues-from-human-brains.html Bio-inspired computing, or the connection machine redux HT @EricTopol

Advertisements

The End of Typing: The Next Billion Mobile Users Will Rely on Video and Voice

September 21, 2017

Next 1B Mobile Users Will Rely on Video & Voice
https://www.WSJ.com/articles/the-end-of-typing-the-internets-next-billion-users-will-use-video-and-voice-1502116070 Will drive computing in new directions from text HT @ElementoLab

How to Follow Hurricane Irma

September 16, 2017

How to Follow #HurricaneIrma
https://www.NYTimes.com/2017/09/06/upshot/how-to-follow-hurricane-irma.html Presentations of weather #uncertainty – cones, spaghetti plots, ensemble forecasts, &c

QT:{[”

Besides individual model runs, there are two other types of
model-based maps you might see on the internet. They’re both “spaghetti plots,” which depict many forecast tracks…..
While you might think that these capture the full range of
uncertainty, they often do not. They’re even more prone to understate the total uncertainty than the N.H.C. “cone.”

Another type of spaghetti plot shows an ensemble forecast. Unlike a typical “determinist” forecast, which takes current conditions and simulates a single scenario forward, an ensemble model varies initial conditions slightly and then simulates, propagating uncertainty through the forecast.
“}}

Who Owns the Internet?

September 11, 2017

The content of no content
https://www.NewYorker.com/magazine/2017/08/28/who-owns-the-internet/amp How powerful Big Tech is. Does it own the internet & by extension the media?

Identity Thieves Hijack Cellphone Accounts to Go After Virtual Currency

September 5, 2017

Identity Thieves Hijack Cellphone Accounts to Go After Virtual
Currency https://www.nytimes.com/2017/08/21/business/dealbook/phone-hack-bitcoin-virtual-currency.html Problematic #privacy loophole w/ #2factor

QT::{{”
“Hackers have discovered that one of the most central elements of online security — the mobile phone number — is also one of the easiest to steal.
In a growing number of online attacks, hackers have been calling up Verizon, T-Mobile U.S., Sprint and AT&T and asking them to transfer control of a victim’s phone number to a device under the control of the hackers.
“}}

Julian Assange, a Man Without a Country

September 3, 2017

.@JulianAssange, man w/o a country
https://www.NewYorker.com/magazine/2017/08/21/julian-assange-a-man-without-a-country/amp Eisenhower: “If you can’t solve a problem, enlarge it.” Now applied to @WikiLeaks

QT:{{”
Dwight Eisenhower is said to have once declared, “If you can’t solve a problem, enlarge it.” Assange had taken a personal legal crisis and blown it up into an international incident: he had teleported himself from the mundane into the tragic realm. A number of WikiLeaks volunteers urged him to step down until

There have been calls for his assassination, and for him to be given a Nobel Peace Prize. Assange often describes himself in simple terms—as a fearless activist—but his character is complicated…
“}}

3D printers start to build factories of the future

August 27, 2017

#3Dprinters…factories of the future
https://www.Economist.com/news/briefing/21724368-recent-advances-make-3d-printing-powerful-competitor-conventional-mass-production-3d digital light synthesis, a software-controlled chem rxn, now economic viable

https://www.economist.com/news/briefing/21724369-additive-manufacturing-abandons-economies-scale-3d-printing-transforms-economics

QT:{{”
“Carbon’s printer uses a process called digital light synthesis, which Dr DeSimone describes as “a software-controlled chemical reaction to grow parts”. It starts with a pool of liquid polymer held in a shallow container that has a transparent base. An ultraviolet image of the first layer of the object to be made is projected through the base. This cures (ie, solidifies) a corresponding volume of the polymer, reproducing the image in perfect detail. That now-solid layer attaches itself to the bottom of a tool lowered into the pool from above. The container’s base itself is permeable to oxygen, a substance that inhibits curing. This stops the layer of cured polymer sticking to the base as well, and thus permits the tool to lift that layer slightly. The process is then repeated with a second layer being added to the first from below. And so on. As the desired shape is completed, the tool lifts it out of the container. It is then baked in an oven to strengthen it.

Dr DeSimone says that digital light synthesis overcomes two common problems of 3D printing. First, it is up to 100 times faster than existing polymer-based printers. Second, the baking process knits the layers together more effectively, making for a stronger product and also one that has smooth surfaces, which reduces the need for additional processing.”
“}}

Financial Growing Pains of a Biotech | The Scientist Magazine(R)

August 27, 2017

http://www.the-scientist.com/?articles.amp/articleNo/26614/title/Financial-Growing-Pains-of-a-Biotech/

How DNA-encoded libraries are revolutionizing drug discovery | June 19, 2017 Issue – Vol. 95 Issue 25 | Chemical & Engineering News

August 16, 2017

DNA-encoded libraries are revolutionizing #drug discovery
http://CEN.ACS.org/articles/95/i25/DNA-encoded-libraries-revolutionizing-drug.html For selected compounds, barcode readout of synthetic steps

How to make soldiers’ brains better at noticing threats

August 14, 2017

How to make…brains better at noticing threats
https://www.Economist.com/news/science-and-technology/21725543-target-recognition-warfare-how-make-soldiers-brains-better-noticing beyond AR – AT, augmented thinking! Where machines help us recognize