Technology Guide To Everything http://technologyguideto.com All things about technology and gadgets Wed, 28 Jun 2017 15:30:23 +0000 en-US hourly 1 https://wordpress.org/?v=4.8 Schrdinger’s Cat Is Dead And Alive In Two Boxes At Once http://technologyguideto.com/awesome/schrdingers-cat-is-dead-and-alive-in-two-boxes-at-once/ http://technologyguideto.com/awesome/schrdingers-cat-is-dead-and-alive-in-two-boxes-at-once/#respond Wed, 28 Jun 2017 15:30:23 +0000 http://www.iflscience.com/physics/schr-dingers-cat-dead-and-alive-two-boxes-once If quantum mechanics had a mascot, Schrdingers cat would certainly be it. Now, the famous thought experiment has been upgraded to explain an even weirder system that was achieved for the first time: a spatially separated entangled system of photons in a two-mode superposition. Although it might sound like sciencyjibberish, the new system is quite […]

The post Schrdinger’s Cat Is Dead And Alive In Two Boxes At Once appeared first on Technology Guide To Everything.

]]>

If quantum mechanics had a mascot, Schrdingers cat would certainly be it. Now, the famous thought experiment has been upgraded to explain an even weirder system that was achieved for the first time: a spatially separated entangled system of photons in a two-mode superposition.

Although it might sound like sciencyjibberish, the new system is quite the breakthrough. It shows that researchers can manipulate complex quantum states, andthis discovery, published in Science, has applications in computation and long-distance communication.

But how does the cat comeinto it? Schrdingers catexplains the curious phenomenon of quantum superposition. In the thought experiment, theimaginary cat is locked in a box with a vial of poison that is activated by a binary quantum mechanical process, like a quantum switch on or off. But until it is observed, this process is in a state of superposition, meaning it exists as a combination of all of its statesit is both on and off.

The state of the cat depends on quantum mechanics, so the cat is not alive, its not dead, its both alive and dead. Therefore, the “quantum cat”is a state in a two-mode superposition.

To construct the new state, the researchers from Yale University used another quirk of quantum mechanics:entanglement. The entangled particle cannot be described independently, and even if theyre separated, theyll act as a single system. When the property of one particle is measured, the system instantaneously collapses, but no information is transferred so it doesnt violate relativity.

The team constructed this entangled quantum cat state in a very specific wave. They used two separated cavities (think high-tech microwaveovens) that emitlight particles only at a specific wavelength. The cavities were connected by a supercurrentan electric current with no dissipationwhich allowed the photons in the two cavities to become entangled. The cat is now alive and dead and in both boxesat the same time.

The photons in one cavity were then forced into a superposition state, and the researchers observed the photons in the other cavity. Thisentangled cat state can be constructed using up to 80 photons, but researchers think larger systems can be made.

The construction of such a large system is another great achievement. Macroscopic quantum coherence states exhibit quantum properties at an everyday scale that can then be harnessed in technology. Laser and superconductors are examples of highly coherent systems.

The team believes that this type of stateis the first step in the construction of the logical operation needed for quantum programs, thus bringing us a step closer to quantum computers.

Read more: http://www.iflscience.com/physics/schr-dingers-cat-dead-and-alive-two-boxes-once

The post Schrdinger’s Cat Is Dead And Alive In Two Boxes At Once appeared first on Technology Guide To Everything.

]]>
http://technologyguideto.com/awesome/schrdingers-cat-is-dead-and-alive-in-two-boxes-at-once/feed/ 0
There’s A Female Burglar Stealing Apple Products From San Francisco Startups http://technologyguideto.com/awesome/theres-a-female-burglar-stealing-apple-products-from-san-francisco-startups/ http://technologyguideto.com/awesome/theres-a-female-burglar-stealing-apple-products-from-san-francisco-startups/#respond Tue, 27 Jun 2017 15:31:50 +0000 http://elitedaily.com/news/world/burglar-san-francisco-steals-only-apple-products-startups/883578/ An unidentified woman began breaking into San Francisco startups over the summer, stealing thousands of dollars worth of computer equipment. Companies BuildZoom and Fetch, which share a building, were robbed of numerous laptops and smaller devices, with the thief refusing to take anything not made by Apple. The burglar is still at large, and the […]

The post There’s A Female Burglar Stealing Apple Products From San Francisco Startups appeared first on Technology Guide To Everything.

]]>
theif-elite-dailytheif-elite-daily

An unidentified woman began breaking into San Francisco startups over the summer, stealing thousands of dollars worth of computer equipment.

Companies BuildZoom and Fetch, which share a building, were robbed of numerous laptops and smaller devices, with the thief refusing to take anything not made by Apple.

The burglar is still at large, and the cofounder of BuildZoom has taken matters into his own hands by creating a Tinder profile with the woman’s picture, calling her “Lauren.”

According to the Mirror, Jiyan Wei used images taken by security cameras during a break-in and captioned the profile with:

I rob offices in SF. $5,000 reward for identifying me.

Wei hopes that at least one of the thousands of people who will now see the profile will recognize the woman who stole his MacBook.

BuildZoom cofounder Steve Peterson installed a surveillance camera after the building had been robbed three times in just a few weeks, ABC-7 reported last July.

Footage shows “Lauren” casually walking around the office and putting laptops into a bag before an alarm goes off, sending her immediately out the door.

Peterson told ABC-7 on July 18 that the thief seemed to have cracked the office’s locking system or gotten ahold of the alarm code.

He offered $1,000 for her identification at the time.

Read more: http://elitedaily.com/news/world/burglar-san-francisco-steals-only-apple-products-startups/883578/

The post There’s A Female Burglar Stealing Apple Products From San Francisco Startups appeared first on Technology Guide To Everything.

]]>
http://technologyguideto.com/awesome/theres-a-female-burglar-stealing-apple-products-from-san-francisco-startups/feed/ 0
10 Ridiculous Ways Science Is Trying To Solve Big Problems http://technologyguideto.com/awesome/10-ridiculous-ways-science-is-trying-to-solve-big-problems/ http://technologyguideto.com/awesome/10-ridiculous-ways-science-is-trying-to-solve-big-problems/#respond Mon, 26 Jun 2017 15:30:34 +0000 http://listverse.com/2013/11/15/10-ridiculous-ways-science-is-trying-to-solve-big-problems/ Generally, problem fixing appears very straightforward—locate problem and shoot it down with a drone, or throw money at it until it goes away. However, not all people choose the easy way. Some, in fact, go for the most complex way possible. 10 Creating A Deadly Flu Anyone who knows anything about vaccines and the curing […]

The post 10 Ridiculous Ways Science Is Trying To Solve Big Problems appeared first on Technology Guide To Everything.

]]>
Generally, problem fixing appears very straightforward—locate problem and shoot it down with a drone, or throw money at it until it goes away. However, not all people choose the easy way. Some, in fact, go for the most complex way possible.

10 Creating A Deadly Flu

118564579
Anyone who knows anything about vaccines and the curing of diseases knows that it involves weakening the illness first and defeating that weaker version. Sounds like a plan, right? Strengthening diseases is so crazy that not even scientists would do it, but that’s exactly what they did.

Netherlands researchers have proposed creating a more contagious and deadly version of the bird flu virus—you know, the one that led to mass casualties in African and Asian countries. They want to use this deadlier version to gain new insight on how the virus works, as well as learning how to create a vaccine.

The process of creating vaccines is a difficult one, requiring the researcher to have knowledge of the individual genes and how they may function to counter the body’s defenses. Unlocking each individual gene function is important here. The researchers assure us that it’s completely safe, as they take precautions and are under oversight.

9 Vampire Robots

Blood clots are tricky and dangerous, especially when they are located in the brain. It’s no surprise that surgeons would want to make them easier to deal with, but the method they’ve chosen is downright creepy. Vanderbilt University doctors and engineers have risen to the challenge and collaboratively designed a robot that helps extract blood from clots.

This robot is equipped with a thin needle and a cannula, which is a multi-layered tube that’s used to clear blood clots from the inside of the skull. A CAT scan guides the robot to the chosen location, where it then inserts tube into the brain. The needle then slides through the tube and, with the help of an external pump, extracts blood.

In most lab tests, this method removed 92 percent of a blood clot on a jelly test brain. In future upgrades, this robot will learn how healthy brain tissue deforms around blood clots and will incorporate that into its calculations. It might not be too long before we have robots poking inside our brain to fix us.

8 Smart Paper

114422443
Smartphones, smart homes, smart watches—isn’t there a limit to what can be made smart? Apparently not. GE researcher David Moore and scientists from the University of Washington are developing sheets of smart paper that can help determine whether you’re ill.

The size of a deck of cards, this portable doctor can detect pathogens in your body within an hour using a simple nasal swab. After applying the sample, a pattern of spots will appear, which the companion smartphone app will interpret. Of course, for more serious infections, you still have to go to the doctor, but it would be pretty neat to find out if you’re dying before you get there.

7 Mosquito Drones

162232407
Other than being hovering tools of death, drones have several other uses—like being hovering tools of mosquito death. If you’ve ever been frustrated by a swarm of mosquitoes during a trip to Florida, the Florida Keys Mosquito Control District feels your pain. To that end, they are testing a bunch of unmanned aerial vehicles for their efficiency in wiping out the bloodsucking scum.

While that image you have in your head of drones blasting mosquitoes with missiles may be fun to imagine, the reality is a bit less extravagant. The drones will only be used to detect pools of stagnant water, upon which vans of FKMCD agents will swoop in to clean up the mess.

6 Turning Seizures Into Music

Seizures aren’t pretty. They don’t feel good and they certainly don’t sound good—or do they? Experts in music and neurology have teamed up to discover what a seizure sounds like. The unlikely duo managed to create an audio EEG of brain activity in both a normal state and a seizure state. They translated the rapidly firing neurons to music to allow others to empathize with the patient and understand what happens to the brain during a seizure.

They are now working on converting this technology to a user-friendly model which can be used at home by caretakers and parents to detect oncoming seizures. While this device is far from being commercial just yet, it could eventually help epileptics and cancer patients enormously.

5 Weather-Controlling Lasers

lasers

Storms are an expression of nature’s fury and stand to highlight man’s weakness in the face of raw uncontrolled energy. If science keeps on progressing, however, it may not be that way for long. Some researchers have discovered that lasers can be used to influence water condensation in the air, and perhaps be able to control rainfall.

It sounds crazy, but it’s feasible enough that the second Conference on Laser, Weather. and Climate will be held this year in Geneva. If all goes as planned, we may be able to control weather for parts of the planet—and hopefully not turn it into a deadly weapon in the process.

4 Space Bullets

Scientists who research extraterrestrial life tend to have a thing for Europa, Jupiter’s moon. That’s no surprise—it has one of the largest collections of ice in our solar system, and because ice and water are associated with life, scientists naturally want to investigate this further. However, being human and all, they can’t really do much. To solve this problem, scientists are in the process of building a space bullet to help smash the ice on Europa.

British Engineers have tested a miniature version of this weighing about 20 kilograms (45 lbs) and moving just under the speed of sound. The projectile was able to smash the ice used for the test into dust and emerge unscathed. The full-sized version would weigh at least a few tons and need to have the same effect on Jupiter’s moon for the mission to be successful. While that remains a few years away, sci-fi nerds are rumored to have gone extinct from the anticipation.

3 Mind-Reading Brain Scans

78034220
At this point, we don’t have to tell you that science can do a lot of stuff with your brain—you know, simple things, like mind-reading. That’s right, scientists have the technology to to read your mind. Researchers have demonstrated the ability to use data from an MRI scan of people looking at letters to determine exactly which letters the subject was looking at during the scan.

The procedure could be very helpful to facilitate communication in people who are unable to do so. The team is currently working on ways to maximize the utility and accuracy of the data.

2 Making Rain

159327167
Indonesia has recently been hit with a glut of wild fires. The smoke damage and heat haze have been a big problem for individuals, businesses and the governments. To fight this scourge, the Indonesian government has resorted to rain-making. Yes, you read that right.

In the interest of playing God, the Indonesian government has used a fleet of aircraft to “seed” the clouds. Cloud seeding involves adding silver iodide, dry ice, or liquid propane to the formation, which increases the amount of rain that falls from it. The operation was a slight success with the fires being moderately reduced.

1 Food Delivery Drones

Forget assassinating rogue mosquitoes in Florida—who cares about that when you need your sister’s wedding cake delivered to you ASAP? A Shanghai bakery called Incake says it has responded to the wishes of its clientele who needed finely made cakes baked and delivered yesterday. Incake management had two goals: Deliver the cakes quickly and still be environmentally friendly. The solution? Drones.

The drones were equipped with six rotors, which allowed them to retain enough lift to carry a small cake-sized parcel through the city to the client. Unfortunately, the drones only delivered five cakes before the program was suspended by the company because of complaints made by the police.

Such complaints haven’t deterred Domino’s Pizza’s UK branch from floating a concept video of the same method in London. It’s a novel idea, but most people probably prefer the onerous task of picking up a pizza to a neighborhood drone strike.

Read more: http://listverse.com/2013/11/15/10-ridiculous-ways-science-is-trying-to-solve-big-problems/

The post 10 Ridiculous Ways Science Is Trying To Solve Big Problems appeared first on Technology Guide To Everything.

]]>
http://technologyguideto.com/awesome/10-ridiculous-ways-science-is-trying-to-solve-big-problems/feed/ 0
Intel CEO Paul Otellini Stepping Down http://technologyguideto.com/awesome/intel-ceo-paul-otellini-stepping-down/ http://technologyguideto.com/awesome/intel-ceo-paul-otellini-stepping-down/#respond Sun, 25 Jun 2017 15:29:16 +0000 http://mashable.com/2012/11/19/intel-otellini/ Intel‘s chief is riding over the Ivy Bridge into the sunset. Paul Otellini, who has served as company CEO since 2005, will step down after Intel’s annual stockholder’s meeting in May. Otellini, 62, has been with Intel for his entire career. He joined the company in 1974 fresh from getting his MBA from Berkeley. Before […]

The post Intel CEO Paul Otellini Stepping Down appeared first on Technology Guide To Everything.

]]>
Intel-ceo-paul-otellini-stepping-down-8b4243324c

Intel CEO, Paul Otellini

Intel‘s chief is riding over the Ivy Bridge into the sunset.

Paul Otellini, who has served as company CEO since 2005, will step down after Intel’s annual stockholder’s meeting in May.

Otellini, 62, has been with Intel for his entire career. He joined the company in 1974 fresh from getting his MBA from Berkeley. Before becoming CEO, Otellini was the chief operating officer, and before that he had various executive positions with Intel’s main microprocessor divisions, and he led the introduction of the Pentium processor in the early ’90s.

As CEO, Otellini strengthened the company’s relationship with Apple, which announced its transition to Intel-powered desktops and laptops in 2005. Intel also worked closely with Apple to develop processing technology specifically for the lower-power needs of the MacBook Air. That development eventually led to Ultrabooks, an Intel-trademarked term that denotes a new class of slimmer laptops powered by Intel Core processors.

Otellini also successfully warded off market encroachments from chip rival AMD. While Intel technology is everywhere in PCs today, AMD chips are only carried by a few value brands, and the company’s future has been called into question.

However, under Otellini, Intel hasn’t made much progress in mobile. Although Intel makes mobile processors under the Atom brand, they’re only in a few phones today — mainly overseas models. In Walter Isaacson’s biography, Steve Jobs said Apple explored the possibility of using an Intel chip in the original iPad, but the power demands were too great.

Otellini will retire as both a company officer and director. Intel’s board is seeking his successor now. Intel says it will look both internally and externally for candidates. Intel stock was down slightly as trading opened today, while AMD’s was up.

Are you happy or sad to see Otellini go? And who should be Intel’s next CEO? Share your reaction in the comments.

Image via Justin Sullivan/Getty Images News/Getty Images.

Read more: http://mashable.com/2012/11/19/intel-otellini/

The post Intel CEO Paul Otellini Stepping Down appeared first on Technology Guide To Everything.

]]>
http://technologyguideto.com/awesome/intel-ceo-paul-otellini-stepping-down/feed/ 0
Top 10 Notorious Black Hat Hackers http://technologyguideto.com/awesome/top-10-notorious-black-hat-hackers/ http://technologyguideto.com/awesome/top-10-notorious-black-hat-hackers/#respond Sat, 24 Jun 2017 15:29:10 +0000 http://listverse.com/2012/05/08/top-10-notorious-black-hat-hackers/ To accompany the technological advancements of the computer world and the constant changing definition of a hacker, we thought it was time to look back at ten of the most notorious black hat hackers and the legendary hacks that earned them such a title. First, it should be known that a black hat hacker is […]

The post Top 10 Notorious Black Hat Hackers appeared first on Technology Guide To Everything.

]]>
To accompany the technological advancements of the computer world and the constant changing definition of a hacker, we thought it was time to look back at ten of the most notorious black hat hackers and the legendary hacks that earned them such a title. First, it should be known that a black hat hacker is computing slang for a person who engages in illegal or malicious hacking. A white hat hacker is a computer hacker who intends to improve internet security. It is note-worthy that many white hat hackers, such as Steve Jobs of apple, Mark Zuckerberg of Facebook, and even many hackers listed below, were once black hat hackers.

Kevin-Poulsen

The notorious ’80s black hat hacker, Kevin Poulsen, gained recognition for his hacking of the telephone lines for LA radio station KIIS-FM, securing himself a place as the 102nd caller and winning a brand new Porsche 944, among other prizes. Law enforcement dubbed Poulsen the “Hannibal Lecter of computer crime.” Poulsen went underground as a fugitive when the FBI began its search for him, but in 1991, he was finally captured.

He pleaded guilty to seven counts of mail, wire and computer fraud, money laundering, obstruction of justice, and for obtaining information on covert businesses run by the FBI. Kevin Poulsen was sentenced to 51 months in prison (4 years and 3 months), which was the longest sentence ever given for hacking at the time. However, since serving time, Poulsen has worked as a journalist and is now a senior editor for Wired News. Poulsen’s most note-worthy article details his work on identifying 744 sex offenders with MySpace profiles.

Albert2 Crop Small

Cyber-criminal Albert Gonzalez has been accused of masterminding the biggest ATM and credit card theft in history; from 2005 to 2007, he and his cybergroup had allegedly sold more than 170 million card and ATM numbers. Gonzalez’s team used SQL injection techniques to create malware backdoors on several corporate systems in order to launch packet-sniffing (specifically, ARP Spoofing) attacks, allowing him to steal computer data from internal corporate networks. When he was arrested, authorities seized $1.6 million in cash including $1.1 million found in plastic bags placed in a three-foot drum which had been buried in his parents’ backyard. In 2010, Gonzalez was sentenced to 20 years in federal prison.

12935709251

It’s almost like the opening of a James Bond movie: in 1994, while working from his laptop from his Russian apartment in St. Petersburg, Vladimir Levin transferred $10 million from the accounts of Citibank clients to his own accounts around the world.

However, Levin’s career as a hacker was only short lived, with a capture, imprisonment and recovery of all but $400,000 of the original $10 million. During Levin’s 1997 trial in the United States, he was said to have coordinated the first ever internet bank raid. The truth is Levin’s ability to transfer Citibank client funds to his own accounts was possible through stolen account numbers and PINs. Levin’s scam was a simple interception of clients’ calls while recording the punched in account numbers.

Robert Tappan Morris

On November 2, 1988, Robert Morris released a worm that took down one-tenth of the Internet, crippling 6,000 plus computer systems. It didn’t take long for the police to track him down. Due in part to the need for social acceptance that seems to be common amongst many young hackers, Morris made the fault of chatting about his worm for months before its release on the Internet. Morris claimed it was just a stunt, and added that he truly regretted causing $15 million worth of damage: the estimated amount of carnage his worm left behind.

Morris was one of the first to be tried and convicted under the Computer Fraud and Abuse Act but only had community service and a fine as his penalty. The defense for such a light sentence was that Morris’ worm didn’t destroy the actual contents of affected computers. Morris now works in the department of Electrical Engineering and Computer Science at Massachusetts Institute of Technology (MIT).

Michael-Calce-E1312313052531

In February of 2000, Michael Calce launched a series of widely known denial-of-service attacks against large commercial websites, including Yahoo!, Amazon.com, Dell, eBay, and CNN. He hacked Yahoo! when it was still the web’s leading search engine and caused it to shutdown for about an hour. Like many hackers, Calce exploited websites primarily for pride and establishing dominance for himself and his cybergroup, TNT. In 2001, the Montreal Youth Court sentenced Calce to eight months of open custody, one year of probation, restricted use of the Internet, and a minimal fine.

Worst-Computer-Viruses-2

Smith’s fame is due to being the author of the infamous e-mail virus, Melissa. Smith claims that the Melissa virus was never intended to cause harm, but its simple means of propagation (each infected computer sent out multiple infected emails) overloaded computer systems and servers around the world. Smith’s virus takes an unusual turn in that it was originally hidden in a file that contained passwords to 80 well-known pornography websites. The name Melissa was derived from a lap dancer Smith met while on a trip in Florida. Even though over 60,000 email viruses have been discovered, Smith is the only person to go to federal prison in the United States for sending one.

Adrian-Lamo-Arrest-Warrant

Nicknamed “the homeless hacker,” Adrian Lamo used coffee shops, libraries and internet cafés as his locations for hacking. Apart from being the homeless hacker, Lamo is widely-known for breaking into a series of high-profile computer networks, which include The New York Times, Microsoft, Yahoo!, and MCI WorldCom. In 2002, he added his name to the The New York Times’ internal database of expert sources and utilized LexisNexis account to conduct research on high-profile subjects. The Times filed a complaint, and a warrant for Lamo’s arrest was issued, followed by a 15-month investigation by federal prosecutors in New York.

After several days in hiding, he finally surrendered to the US Marshals, and then to the FBI. Lamo was ordered to pay approximately $65,000 in damages and was sentenced to six months house arrest at his parents’ home, with an additional two years of probation. In June 2010, Lamo disclosed the name of Bradley Manning to U.S. Army authorities as the source of the July 12, 2007 Baghdad airstrike video leak to Wikileaks. Lamo is presently working as a threat analyst and donates his time and skills to a Sacramento-based nonprofit organization.

George-Hotz

The name of the acclaimed jailbreak artist, George Hotz, will forever be associated with the April 2011 PlayStation breach. Being one of the first hackers ever to jailbreak the Sony PlayStation 3, Hotz found himself in the midst of a very relentless, public and messy court battle with Sony – perhaps worsened by Hotz’s public release of his jail breaking methods. In a stated retaliation to Sony’s gap of the unstated rules of jail breaking – never prosecute – the hacker group Anonymous attacked Sony in what would be the dubbed as the most costly security break of all time to date.

Hackers broke into the PlayStation Network and stole personal information of some 77 million users. However, Hotz denied any responsibility for the attack, and added “Running homebrew and exploring security on your devices is cool; hacking into someone else’s server and stealing databases of user info. is not cool.”

391

Jonathan James, 16-year-old black hat hacker, became the first juvenile imprisoned for cybercrime in the United States. James gained his notoriety by implementing a series of successful intrusions into various systems. At an amazingly young age of 15, James specialized in hacking high-profile government systems such as NASA and the Department of Defense. He was reported to have stolen software worth over $1.7 million. He also hacked into the Defense Threat Reduction Agency and intercepted over 3,000 highly secretive messages passing to and from the DTRA employees, while collecting many usernames and passwords.

On May 18, 2008, at the age of 25, James committed suicide using a gun. The words in his suicide note provide some insight into this obviously brilliant but troubled youth who thought he would be a scapegoat and blamed for cyber crimes he did not commit: “I have no faith in the ‘justice’ system. Perhaps my actions today, and this letter, will send a stronger message to the public. Either way, I have lost control over this situation, and this is my only way to regain control.”

Gary

In 2002, an exceptionally odd message appeared on a US Army computer screen: “Your security system is crap,” it read. “I am Solo. I will continue to disrupt at the highest levels.” It was later identified as the work of Scottish systems administrator, Gary McKinnon.

McKinnon suffers from Asperger’s syndrome, which is the least severe form of autism. The symptoms of Asperger’s syndrome certainly match Gary’s actions: that is, highly intelligent with an exceptional understanding of complex systems. Though sufferers often have difficulty reading social cues and acknowledging the impact of their often-obsessive behavior, they tend to be geniuses in one particular subject. For Gary, it was computers.

Gary has been accused of executing the largest ever hack of United States government computer networks — including Army, Air Force, Navy and NASA systems. The court had recommended that McKinnon be apprehended to the United States to face charges of illegally accessing 97 computers, causing a total of $700,000 in damage. Even more interesting are McKinnon’s motives for the large scale hackings, which he claims were in search of information on UFOs. He believed the US government was hiding such information in its military computers.

220Px-%D0%9A%D0%B5%D0%B2%D0%B8%D0%Bd %D0%9C%D0%B8%D1%82%D0%Bd%D0%B8%D0%Ba Ctqxfc

Kevin David Mitnick (born on August 6, 1963) is an American computer security consultant, author, and hacker. In the late 20th century, he was convicted of various computer- and communications-related crimes. At the time of his arrest, he was the most-wanted computer criminal in the United States. Mitnick gained unauthorized access to his first computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC’s computer network and copied their software, a crime he was charged with and convicted of in 1988.

According to the U.S. Department of Justice, Mitnick gained unauthorized access to dozens of computer networks while he was a fugitive. He used cloned cellular phones to hide his location and, among other things, copied valuable proprietary software from some of the country’s largest cellular telephone and computer companies. Mitnick also intercepted and stole computer passwords, altered computer networks, and broke into and read private e-mail.

Due to his fame he is included as a bonus entry here.

Read more: http://listverse.com/2012/05/08/top-10-notorious-black-hat-hackers/

The post Top 10 Notorious Black Hat Hackers appeared first on Technology Guide To Everything.

]]>
http://technologyguideto.com/awesome/top-10-notorious-black-hat-hackers/feed/ 0
Gizmondo Returns? Megawhat Gadget & Technology News 23.01.08 http://technologyguideto.com/videos/gizmondo-returns-megawhat-gadget-technology-news-23-01-08/ http://technologyguideto.com/videos/gizmondo-returns-megawhat-gadget-technology-news-23-01-08/#respond Fri, 23 Jun 2017 17:00:02 +0000 http://technologyguideto.com/?p=5446 24.01.08 Last.fm offers free music streaming, Gizmondo to re-launch in 2008? Launches of Canon EOS 45OD DSLR, Pentax and Samsung DSLR and Fujifilm cameras

The post Gizmondo Returns? Megawhat Gadget & Technology News 23.01.08 appeared first on Technology Guide To Everything.

]]>

24.01.08 Last.fm offers free music streaming, Gizmondo to re-launch in 2008? Launches of Canon EOS 45OD DSLR, Pentax and Samsung DSLR and Fujifilm cameras

The post Gizmondo Returns? Megawhat Gadget & Technology News 23.01.08 appeared first on Technology Guide To Everything.

]]>
http://technologyguideto.com/videos/gizmondo-returns-megawhat-gadget-technology-news-23-01-08/feed/ 0
Split Screen Showcases The Movie Magic Of ‘Who Framed Roger Rabbit’ http://technologyguideto.com/awesome/split-screen-showcases-the-movie-magic-of-who-framed-roger-rabbit/ http://technologyguideto.com/awesome/split-screen-showcases-the-movie-magic-of-who-framed-roger-rabbit/#respond Fri, 23 Jun 2017 15:29:17 +0000 http://www.wimp.com/who-framed-roger-rabbit-movie-magic/ In 1988, Who Framed Roger Rabbit hit theaters and introduced a magical world where your favorite cartoon characters live in the same world as humans. While animated characters had appeared side by side with live actors before Roger Rabbit took the effect to new levels, earning multiple Academy Awards for its groundbreaking methods.  Now, 27 years […]

The post Split Screen Showcases The Movie Magic Of ‘Who Framed Roger Rabbit’ appeared first on Technology Guide To Everything.

]]>

In 1988, Who Framed Roger Rabbit hit theaters and introduced a magical world where your favorite cartoon characters live in the same world as humans. While animated characters had appeared side by side with live actors before Roger Rabbit took the effect to new levels, earning multiple Academy Awards for its groundbreaking methods. 

Now, 27 years later, we can take a look back at the making of one of the film’s most memorable sequences, Eddie Valiant’s chaotic trip to Toon Town. Utilizing a split screen this video shows you how the scene looked during the movie and filming. Actor Bob Hoskins falls, runs, and swings across a mostly blank blue backdrop, but his incredible skills as a comedic actor shine through. Given how little he had to work with it’s remarkable to watch as his performance perfectly syncs up with the animated footage. While computers have made sequences like this more common in modern cinema, this look back at how the technology got its start will give you a new appreciation for this cinema classic.

Read more: http://www.wimp.com/who-framed-roger-rabbit-movie-magic/

The post Split Screen Showcases The Movie Magic Of ‘Who Framed Roger Rabbit’ appeared first on Technology Guide To Everything.

]]>
http://technologyguideto.com/awesome/split-screen-showcases-the-movie-magic-of-who-framed-roger-rabbit/feed/ 0
NASA Plans To Send People To Mars By 2035 http://technologyguideto.com/awesome/nasa-plans-to-send-people-to-mars-by-2035/ http://technologyguideto.com/awesome/nasa-plans-to-send-people-to-mars-by-2035/#respond Thu, 22 Jun 2017 15:29:44 +0000 http://www.iflscience.com/space/nasa-plans-send-people-mars-2035 NASA has recommitted itself to landing humans on Mars by 2035, but has admitted that this is a project that will require the world to work together. NASA’s chief scientist Ellen Stofan gave a talk to the Royal Institution in London a fortnight ago, and video of the talk has now been released. “This is […]

The post NASA Plans To Send People To Mars By 2035 appeared first on Technology Guide To Everything.

]]>

NASA has recommitted itself to landing humans on Mars by 2035, but has admitted that this is a project that will require the world to work together.

NASA’s chief scientist Ellen Stofan gave a talk to the Royal Institution in London a fortnight ago, and video of the talk has now been released. “This is not something any one nation can do on their own,” Stofan said. “It’s something that humanity is going to do together.” 

Stofan sees a Mars mission as a crucial part of the quest to answer the three questions she says turn up repeatedly in NASA’s goals: “Are we alone, how did we get here and how does the universe work.” Mars is particularly important for answering the other two, she argued, although she also talked about the potential for life on Europa and Enceladus.

The capacity of humans to collect the information we need to “understand Mars” still far exceeds anything rovers can manage, Stefan said. For this reason it is worth the vastly higher cost assocaited with sending people who need to be sustained on the journey. “We’re not sending astronauts to Mars, we’re sending scientists,” she said. “We’re not going there for the fun of it, we’re going to do science.”

President Obama announced plans for a mission to Mars in 2010 and continues to plan on that timeline, but the commitment has been questioned. Any program that will take so long to produce results is highly vulnerable to changes in priorities and funding cutbacks. Stofan herself noted “We’re trying to do something very bold over a long timespan, and that is something challenging in a world that usually doesn’t work of 5, 10, 20 year time horizons.”

Stofan says that before we can send people to Mars we need to know much more, particularly about the effects of microgravity on humans over such a long time and how to maintain a healthy diet over such a time with no opportunity to resupply.. 

One of the major questions facing a Mars mission is whether the mission will be a quick visit like the Moon landings, or part of a colonization program. “I don’t think that first group will necessarily stay there, but we need to think of this as establishing an outpost,” Stofan said. “We want it to be possible for those people to come back if they want to, but it’s the beginning of sustained human presence on Mars.” 

A common criticism of NASA’s Mars program is that it is being distracted by programs such as a return to the Moon and exploration of asteroids. Stofan defended these programs. “The moon remains an extremely important target,” she said. “The moon has preserved our history,” when erosion removed it from the Earth. 

Jim Adams, NASA’s deputy chief technologist also spoke, describing plans to capture an asteroid for study. “We first thought, ‘We’ll send an astronaut to an asteroid,’ ” he said. “Then we realized how hard that is. Just to catch up to one requires so much rocket propulsion, it’s almost impossible. Once we find the right one, we’ll use all the technology we’ve got. We’ll snag it, we’ll bag it and we’ll drag it into orbit around the moon. Then we can send humans to a target that enables us to practice deep space operations.” 

Towards this goal, NASA is keeping a look out for asteroids around 10m long we could capture in this way and use as a test site for landing. “The point isn’t the asteroid,” Adams said. “It’s the living and working together and the technology to be able to do that.” 

Read more: http://www.iflscience.com/space/nasa-plans-send-people-mars-2035

The post NASA Plans To Send People To Mars By 2035 appeared first on Technology Guide To Everything.

]]>
http://technologyguideto.com/awesome/nasa-plans-to-send-people-to-mars-by-2035/feed/ 0
The Newest Reality Show Sensation, Starring Your Teen http://technologyguideto.com/awesome/the-newest-reality-show-sensation-starring-your-teen/ http://technologyguideto.com/awesome/the-newest-reality-show-sensation-starring-your-teen/#respond Wed, 21 Jun 2017 15:28:57 +0000 http://mashable.com/2013/05/10/digital-dilemma-lifecasting-teens/ I’m not sure when I first heard the term “lifecasting.” It may have been in the late 90s when the TV reality show Big Brother first reached our living rooms, or it could have been much later when Sarah Austin promoted her own brand of video journalism and became famous for being famous. Back in […]

The post The Newest Reality Show Sensation, Starring Your Teen appeared first on Technology Guide To Everything.

]]>
Realitytv

I’m not sure when I first heard the term “lifecasting.” It may have been in the late 90s when the TV reality show Big Brother first reached our living rooms, or it could have been much later when Sarah Austin promoted her own brand of video journalism and became famous for being famous.

Back in those days, lifecasting — the continuous live video streaming of a person’s everyday life — was an exciting novelty, an opportunity to abandon our own mundane lives and experience the thrill of being someone else.

I thought of lifecasting the other day when I saw my 13-year-old daughter trading Vines with some of her friends. When Twitter first released Vine in January of this year, I didn’t think it would take too long for a generation hooked on YouTube and SnapChat to discover this almost too perfect self-broadcasting platform.

Now teen airwaves are awash with 6-second video loops, which is just enough time to be quirky, funny, cute and everything else that a self-respecting teenage girl needs to be.

But Vine is really just the tip of the iceberg.There are dozens of different ways in which our kids are encouraged to share their lives online, most of them calling for increasing amounts of video. YouTube, Vimeo, Facebook, Instagram and Twitter are the most popular ones we all know about — that’s before we start adding new celebrity hangout sites like Hang w/ and Upfront.

Hardware and networking advances are driving the wave of new broadcasting apps. Whereas Big Brother required six cameras and a satellite truck, all our lifecasting kids need is a smartphone. Even schools are taking advantage of the new technologies, encouraging students to submit videos for science classes and other group projects.

However, despite the ubiquity of self-promotional platforms, surrounding immature and impressionable teens with 24/7 broadcast tools remains a worrying prospect. For every opportunity that our kids have to be funny and cute, there is also an opportunity for them to make a mistake. And as we all know, web-based mistakes tend to last a lot longer than web-based cuteness.

When everyone is on camera, we tend to drop our guard. That’s what makes reality shows so compelling. As our kids star in their own reality shows, let’s make sure it’s a reality that we want the whole world to see.

This post is part of a series on the dilemmas of raising digital kids. We’d like to hear some of the parenting issues technology has raised for you. Please let us know in the comments, or on our Mashable Lifestyle Facebook page. You can also follow and tweet us @mashlifestyle.

Image via iStockphoto, chuwy

Monica%2520vila-1194

Monica Vila

Monica Vila is co-founder of TheOnlineMom.com, an organization that provides technology education to families and helps moms connect with brands they can trust.

Read more: http://mashable.com/2013/05/10/digital-dilemma-lifecasting-teens/

The post The Newest Reality Show Sensation, Starring Your Teen appeared first on Technology Guide To Everything.

]]>
http://technologyguideto.com/awesome/the-newest-reality-show-sensation-starring-your-teen/feed/ 0
Researchers grow human kidney using stem cells http://technologyguideto.com/awesome/researchers-grow-human-kidney-using-stem-cells/ http://technologyguideto.com/awesome/researchers-grow-human-kidney-using-stem-cells/#respond Tue, 20 Jun 2017 15:29:03 +0000 http://www.iflscience.com/health-and-medicine/researchers-grow-human-kidney-using-stem-cells Around 2% of all adults experience kidney disease, and which results in tens of thousands of deaths each year. Only 25% of those on the wait list for a donor kidney will ever receive the lifesaving call. Researchers have announced that they have grown a rudimentary kidney in the laboratory using human stem cells, which […]

The post Researchers grow human kidney using stem cells appeared first on Technology Guide To Everything.

]]>

Around 2% of all adults experience kidney disease, and which results in tens of thousands of deaths each year. Only 25% of those on the wait list for a donor kidney will ever receive the lifesaving call. Researchers have announced that they have grown a rudimentary kidney in the laboratory using human stem cells, which may give more treatment options to those with renal disease. The paper was published in Nature Cell Biology by Melissa Little from the University of Queensland’s Institute for Molecular Bioscience.

The kidney is an organ in the urinary system which is used to ensure homeostasis in the body by regulating electrolytes, pH of the body, and even blood pressure. It is built from two different stem cell types. The team working in Little’s lab originally meant to create one kind, but was very surprised to discover that both cells had been created. As the cells began to grow and proliferate, they assembled themselves into a miniature human kidney. The team used specific growth factors along with information about normal embryological development in order to guide the cells toward the intended complete organ.

Earlier this year, an American team announced that they had created a rat kidney from stem cells, though it was incredibly inefficient when transplanted into an organism. This organ from Little’s lab was created with human stem cells and can give researchers an unprecedented insight into how new medications will impact human kidneys, which can dramatically improve success in clinical safety trials. They also represent the potential for improved treatment of renal disease, as that is an area that is lacking at present. For those who are suffering renal disease, dialysis and organ transplantation are the two main treatments available. Eventually, decades down the road, this technology could potentially be used to create full-sized replacement organs for those who have exhausted all other options.

Currently, the kidneys are very small and are about the size that you would find in a five-week old human embryo. This technology needs to become much more advanced before it will be useful in a clinical setting, but that does not at all take from the significance of this announcement. The cellular complexity of this newly manufactured kidney is unlike anything that has been seen before in lab-grown organs. Using stem cells to create new organs for drug safety testing and transplantation purposes has been a goal among those in regenerative medicine for years, and the results from Melissa Little’s lab presents a very large step forward. 

Read more: http://www.iflscience.com/health-and-medicine/researchers-grow-human-kidney-using-stem-cells

The post Researchers grow human kidney using stem cells appeared first on Technology Guide To Everything.

]]>
http://technologyguideto.com/awesome/researchers-grow-human-kidney-using-stem-cells/feed/ 0