Research

High-Fidelity & Ultrafast Initialization of a Hole-Spin Bound Qubit |  A paper titled “High-Fidelity & Ultrafast Initialization of a Hole-Spin Bound to a Te Isoelectronic Centre in ZnSe”  recently published in the prestigious scientific journal, Physical Review Letters. A quantum computing breakthrough in it’s own regard. |  20161109

Kill Chain Analysis of Target Breach  |  December of 2013 cyber thieves pulled off an attack against one of the largest US retailers. Sensitive data for more than 110 million customers was pilfered. This report analyzed data using a technique developed by Lockheed Martin in 2011. Written and published by The US Senate Committee on Commerce, Science & Transportation @ the behest of Majority Staff Chairman Rockefeller.  |  20140326

WordPress Core Security Vulnerabilities  |  This document is an internal analysis & explanation of the WP Core Software development & its security processes, as well as an examination of the inherent security built-in directly. The Core WP Software has its own security processes, risks, & solutions22. This pdf document refers to security regarding the self­-hosted, downloadable open source versions of WP available from WordPress.org & installable on any server in the world.  |  20150310

Remote Locomotion Control of Cockroaches  |  Natural systems retain significant advantages over engineered systems in many aspects, including size and versatility. Texas A&M University researchers released there findings, methods via The Royal Society Publishing which shows how they developed a hybrid robotic system using American (Periplaneta americana) & discoid (Blaberus discoidalis) cockroaches that uses the natural locomotion & robust-ness of the insect. Hybrid discoid roaches were able to walk, & turn in response to an electrical stimulus to its nervous system with high repeatability of 60%.  |  20150206

iSeeYou: Disabling MacBook Webcam Indicator LED  |  Marcus Thomas, Assistant Director of the FBI’s Operational Technology Division in Quantico disturbs many with his assertion webcams, even Apple’s iSight cameras can be hacked. This report from two researchers @ John Hopkins University describe how to disable the LED on a class of Apple internal iSight webcams used in MacBooks & iMac desktops. The technique enables video to be captured without any visual indication to the user & can be accomplished entirely in user space by an unprivileged (non- root) application.  |  20150417

Backscatter X-Ray Machines  |  Researchers uncover security vulnerabilities in DHS & TSA x-ray machines deployed in airports, jails, courthouses & other sensitive places.  |  20140821

Feeling the Future: The Emotional Oracle Effect  |  Researchers uncover an intriguing phenomenon: Individuals who have higher trust in their feelings are better able to predict the outcomes of future events than individuals with lower trust in their feelings. High trust in feelings improves prediction accuracy. In the end reseachers from both Colombia University & Insead in France  speculate trust in one‘s feelings encourages access to a―”privileged window” into the vast amount of information people learn consciously & unconsciously about their environment.  |  20140325

Electronic Skin Lights Up When Touched  |  Imagine an interactive dashboard or wallpaper inspired by the body’s largest organ.  |  20130813

Zeolite Brief  |  20130801

Creator of BSD Says Encryption Is Not The Answer To Privacy Concerns  |  20130730

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s