ElectronicsNew research demonstrates the development of the first stretchable integrated circuit, made entirely using an inkjet printer.

The team behind this research believes this development could lead to the manufacturing of inexpensive “smart fabric.” Potential applications include wallpaper that can turn an entire wall into an electronic display and electronics that could be scaled up and down easily.

“We can conceivably make the costs of producing flexible electronics comparable to the costs of printing newspapers,” says Chuan Wang, co-author of the paper and former ECS member. “Our work could soon lead to printed displays that can easily be stretched to larger sizes, as well as wearable electronics and soft robotics applications.”

(more…)

Cyber Security via IStockA team of researchers from Georgia Institute of Technology recently developed a new form of ransomware that could take over control of water treatment plants. The simulated hacking exercise was able to command programmable logic controls (PLCs) to shut down water valves, increase or decrease the amount of chemicals used to treat water, and churn out false readings.

According to the researchers, simulations were conducted to highlight the vulnerabilities in critical infrastructure. This research comes at a time when cyber security concerns have reached a high point in light of recent cyber attacking and hacking attempts across the globe.

Cyber attacks go far beyond the acquisition of emails and corruption of websites. Any establishment with PLCs is, in theory, vulnerable to hacking. This could range from water infrastructure, as demonstrated here, to electrical dependency.

(more…)

Silicon ValleyNearly 100 tech companies have filed an amicus brief condemning U.S. President Donald Trump’s executive order concerning immigration.

The legal brief emphasizes what the companies believe to be the importance of immigrants in both the economy and society.

This from the brief:

Immigrants make many of the Nation’s greatest discoveries, and create some of the country’s most innovative and iconic companies. America has long recognized the importance of protecting ourselves against those who would do us harm. But it has done so while maintaining our fundamental commitment to welcoming immigrants—through increased background checks and other controls on people seeking to enter our country.

The brief cites the executive order as illegal, discriminatory, and ultimately damaging for U.S. companies. The complete list of opposing companies follows:

(more…)

By: William Messner, Tufts University

Driverless carWhen a May 2016 crash killed the person operating a Tesla Model S driving in Autopilot mode, advocates of autonomous vehicles feared a slowdown in development of self-driving cars.

Instead the opposite has occurred. In August, Ford publicly committed to field self-driving cars by 2021. In September, Uber began picking up passengers with self-driving cars in Pittsburgh, albeit with safety drivers ready to take over.

October saw Tesla itself undeterred by the fatality. The company began producing cars it said had all the hardware needed for autonomous operation; the software will be written and added later. In December, days after Michigan established regulations for testing autonomous vehicles in December, General Motors started doing just that with self-driving Chevy Bolts. And just one day before the end of his term, U.S. Secretary of Transportation Anthony Foxx designated 10 research centers as official test sites for automated vehicle systems.

Three of the most significant developments in the industry happened earlier this month. The 2017 Consumer Electronics Show (CES) in Las Vegas and the North American International Auto Show in Detroit saw automakers new and old (and their suppliers) show off their plans and innovations in this arena. And the National Transportation Safety Board (NTSB) issued its report on the Tesla fatality. Together, they suggest a future filled with driverless cars that are both safer than today’s vehicles and radically different in appearance and comfort.

(more…)

E-Waste Volume Hits New Peak

E-wasteAs the demand for newer, faster electronics rises, so does the amount of e-waste across the globe.

E-waste refers to discarded electrical and electronic equipment, the amount of which has risen by 63 percent in just the past five years. Globally, it’s observed that the volume of e-waste has hit an astonishing new peak, totaling in at over 40 tons – seven percent of which includes communication devices such as smartphones and computers.

The challenge of rising levels of e-waste is a global issue. A report from U.N. think tank, United Nations University, shows that in 12 Asian countries, the volume of e-waste increased by nearly two-thirds between 2010 and 2015. Hong Kong, for example, produced nearly 48 pounds per person in digital trash. To compare, the average waste from Europe and the Americas is approximately 34 pounds per person.

Because Asia buys about half of all electronics on the market, the uptick in e-waste is expected. However, the infrastructure to recycle and the laws that mandate such actions do not exist in these countries. In the United States, however, states such as New York have implemented bans on disposing of unwanted electronics, posing fines to those who do not properly recycle their devices.

E-waste shows both great potential and hazards for the world. On one hand, it’s estimated that in the United States alone, the over $50 billion is wasted in the form of digital trash that can be recycled for alternative uses.

Additionally, e-waste – which includes components such as lithium-ion batteries – if not properly disposed of, could lead to substantial amounts of health-threatening toxins such as mercury, cadmium, chromium, and ozone-depleting chlorofluorocarbons.

Posted in Technology

By: Jeff Inglis, The Conversation

Editor’s note: The following is a roundup of archival stories.

Net neutralityWith the selection of Ajit Pai to chair the Federal Communications Commission, President Trump has elevated a major foe of net neutrality from the minority on the commission to its head. Pai, already a commissioner and therefore needing no Senate approval to become its chair, would need to be reconfirmed by the end of 2017 to continue to serve.

But what is net neutrality, this policy Pai has spent years criticizing? Here are some highlights of The Conversation’s coverage of the controversy around the concept of keeping the internet open:

Public interest versus private profit

The basic conflict is a result of the history of the internet, and the telecommunications industry more generally, writes internet law scholar Allen Hammond at Santa Clara University:

Like the telephone, broadcast and cable predecessors from which they evolved, the wire and mobile broadband networks that carry internet traffic travel over public property. The spectrum and land over which these broadband networks travel are known as rights of way. Congress allowed each network technology to be privately owned. However, the explicit arrangement has been that private owner access to the publicly owned spectrum and rights of way necessary to exploit the technology is exchanged for public access and speech rights.

The government is trying to balance competing interests in how the benefits of those network services. Should people have unfiltered access to any and all data services, or should some internet providers be allowed to charge a premium to let companies reach audiences more widely and more quickly?

(more…)

By: David Danks, Carnegie Mellon University

Autonomous driverless carIn 2016, self-driving cars went mainstream. Uber’s autonomous vehicles became ubiquitous in neighborhoods where I live in Pittsburgh, and briefly in San Francisco. The U.S. Department of Transportation issued new regulatory guidance for them. Countless papers and columns discussed how self-driving cars should solve ethical quandaries when things go wrong. And, unfortunately, 2016 also saw the first fatality involving an autonomous vehicle.

Autonomous technologies are rapidly spreading beyond the transportation sector, into health care, advanced cyberdefense and even autonomous weapons. In 2017, we’ll have to decide whether we can trust these technologies. That’s going to be much harder than we might expect.

Trust is complex and varied, but also a key part of our lives. We often trust technology based on predictability: I trust something if I know what it will do in a particular situation, even if I don’t know why. For example, I trust my computer because I know how it will function, including when it will break down. I stop trusting if it starts to behave differently or surprisingly.

In contrast, my trust in my wife is based on understanding her beliefs, values and personality. More generally, interpersonal trust does not involve knowing exactly what the other person will do – my wife certainly surprises me sometimes! – but rather why they act as they do. And of course, we can trust someone (or something) in both ways, if we know both what they will do and why.

I have been exploring possible bases for our trust in self-driving cars and other autonomous technology from both ethical and psychological perspectives. These are devices, so predictability might seem like the key. Because of their autonomy, however, we need to consider the importance and value – and the challenge – of learning to trust them in the way we trust other human beings.

Autonomy and predictability

We want our technologies, including self-driving cars, to behave in ways we can predict and expect. Of course, these systems can be quite sensitive to the context, including other vehicles, pedestrians, weather conditions and so forth. In general, though, we might expect that a self-driving car that is repeatedly placed in the same environment should presumably behave similarly each time. But in what sense would these highly predictable cars be autonomous, rather than merely automatic?

(more…)

Detecting Disease Through Your Breath

One of the major challenges in modern medicine is how to accurately detect disease when people are still feeling healthy. Researchers and doctors alike have long since wondered how to diagnose diseases such as cancer before it progresses too far.

Now, the medical community may find that answer in a new development out of Technion – Israel Institute of Technology called the Na-Nose.

The Na-Nose is a newly developed device that can analyze the chemical signature of exhaled gases to diagnose diseases with 86 percent accuracy. The science behind the device uses carbon nanotubes and gold particles to isolate volatile biomarkers in a patient’s breath.

Researchers then used a computer algorithm to recognize the biomarkers, creating a tool that can quickly and accurately detect diseases such as ovarian cancer or multiple sclerosis in early stages without any invasive procedures.

“It works in the same way we’d use dogs in order to detect specific compounds,” Hossam Haick, co-author of the study, told Smithsonian. “We bring something to the nose of a dog, and the dog will transfer that chemical mixture to an electrical signature and provide it to the brain, and then memorize it in specific regions of the brain … This is exactly what we do. We let it smell a given disease but instead of a nose we use chemical sensors, and instead of the brain we use the algorithms. Then in the future, it can recognize the disease as a dog might recognize a scent.”

By: Jungwoo Ryoo, Pennsylvania State University

Cyber securityCybersecurity concerns crop up everywhere you turn lately – around the election, email services, retailers. And academic institutions haven’t been immune to security breaches either. According to a recent report by VMware, almost all universities (87 percent) in the United Kingdom have been the victims of cyber crime. In general, from 2006 to 2013, 550 universities suffered data breaches. When higher ed breaches occur, attackers typically steal student information, intellectual property or research data. Among the criminals behind these attacks are nation-states and organized crime groups motivated by the economic gain.

A common knee-jerk reaction to a cyberattack – wherever it happens – is to clamp down on access and add more security control. For example, in 2005 after a major attack against a credit card processor affected 40 million customers, there were urgent calls for new mandatory encryption standards in the U.S. Senate. As paranoia sets in, a sense of urgency to do something about a possible next attack takes over, just like what happened in the University of California system. After a 2015 hack, the university administration started monitoring user traffic without consulting faculty and students (not to mention receiving their consent), resulting in a huge backlash.

As is so often the case, too much of anything is not good. Cybersecurity is a delicate balancing act between usability and countermeasures designed to reduce or prevent threats. A one-size-fits-all, or Procrustean, approach usually leads to lower productivity and a large group of unhappy users. And it’s particularly tricky to get the balance right in an academic setting.

(more…)

grace-hopper

Grace Hopper

Two female tech pioneers won the Presidential Medal of Freedom. Grace Hopper, known as the “first lady of software,” and Margaret Hamilton, regarded for her leadership role in a NASA software team that helped land a man on the moon, continued to break the glass ceilings in computer science upon receiving this prestigious award.

Hopper was one of the first programmers of the Harvard Mark I and a pioneer in computer science until she passed away in 1992.

When discussing Hopper’s achievements, U.S. President Barack Obama said, “If Wright is flight, and Edison is light, then Hopper is code.”

Margaret Hamilton

Margaret Hamilton

Hamilton played a major role on the 1960s NASA team that got a man to the moon. She was critical in developing the on-board flight software for the Apollo space program.

President Obama said, “Luckily for us, Margaret never stopped pioneering. She symbolizes that generation of unsung women who helped send humankind into space.”

From cellphones to cyber command, the work of these women has helped shape the world we currently live in.

  • Page 6 of 15