Police Use Robot to Kill Sniper

killer robot
The infamous murder of five police officers that occurred during a Black Lives Matter protest in Dallas, Texas has brought to light a new police method for controlling the threat of snipers: the use of killer robots. In an effort to avoid putting more police officers in danger during the attack, the Dallas police force used a robot to deliver an explosive device that ultimately ended the sniper's life. While robots and unmanned systems have been in use by the US military before (drones, fo...
More

Tech: Instruments of Social Change

eerbeerqueer
We live in a time where more than ever we have the means to hear and be heard by more people than ever before across different walks of life and with different needs and wants. This is what the internet has done for us, it was made it so any cause of voice, for better or worse, no matter how insane has the ability to be heard by anyone in the world. It only takes the reality of something to be trending and soon everyone at the very least becomes familiar with it in the most broad sense and the a...
More

CNC Opening Up New Frontiers for Medical Devices

969D726F-9AEE-4F92-A6A8-E10B97E249B5
Today there is a substantial amount of legal requirements one must go through before they are able to manufacture the complex specifications of a medical implant. This is a good thing and ensures that what we are putting into the bodies of ourselves and our loved ones are held to the highest medical standards and quality controls across any market today or ever. However, what this has done in our demanding for excellence remains the reality that in order to make things at this high of a quality ...
More

Tech Alarms Attract Public Attention

The flurry of technological advancements and startups to match has left a lot of heads spinning and a lot of "industry professionals" in the dust. However, this rapid state of change seems to be far from evening out into a predictable marketplace. In fact, it's beginning to look like many of the Silicon Valley powerhouses of today (Facebook, Juniper, Twitter, etc) may be the crash-and-burn stories of the post-tech-bubble-burst era that many economists say is coming our way. Who survives and who ...
More

Encryption and Quantum Computing

quantum
This week researchers at MIT and the University of Innsbruck announced that they have designed and built the world's very first scalable quantum computer. With this one leap forward in technology they have essentially proclaimed as well that all existing approaches to security inherent to encryption today is now effectively obsolete. This was achieved by using five atoms in an ion trap. If you don't understand how this works, don't worry you can count the people who actually do in the world on y...
More

How to Know if You’ve Been Hacked

know hack
Cyber security breaches are not uncommon; in fact, they were basically all the rage in 2015, and they show no sign of slowing down. If federal government agencies can be hacked, private consumers are basically sitting ducks. Here's how you can know if your personal computer has been hacked. Unfortunately for internet users, hacker software has become so sophisticated that it's hard to detect once it's become embedded in your system. Antivirus/anti-malware software can be effective when it com...
More

The Debate About Web Browsers

brace
A long time has passed since JavaScript inventor Brendan Eich's Mozilla Firefox toppled Internet Explorer from its pinnacle as the only web browser available to web users. Since then, Chrome, Safari and a handful of other browsers have cropped up, each offering different operating systems and slightly different features, but being overall the same. However, Eich's most recent attempt to disrupt the internet browsing industry promises to spice things up a little. Eich just established a startu...
More

Secrets Revealed Regarding Juniper Backdoor

junipere
Weaknesses in the Juniper firewall have been known since 2007 when Microsoft employee Dan Shumow held a cryptography conference in California during which he shared the discoveries that he and a Microsoft colleague named Niels Ferguson had made regarding the firewall's algorithm. Although the algorithm had been approved by the National Institute of Standards and Technology for inclusion in a standard that could be sued to encrypt government classified communication, Shumow and Furguson figure...
More

Best Online Tools for ESL Learners

duolingo
Learning another language in adulthood is extremely difficult; doctors, teachers, and students agree that after puberty, the brain restructures itself in such a way that language acquisition becomes an uphill climb. That said, there's a lot to be gained from this venture, both from a cultural perspective, and in terms of brain health. For example, a Swedish MRI study showed that learning a foreign language during adulthood has a visible effect on the brain; it makes it grow larger in certain ...
More

Meet the Diode

diods
Whether you're talking on your phone, typing on your computer, or backing up important data to your hard drive, chances are you're taking for granted that a lot of tiny electrical components do their job right so you can do yours. Few understand in full the complexities of the circuit boards responsible for the Western way of life, but that just mean's now is as good a time as any to learn. Here's a brief intro to a very important electrical component: the diode. First off, it's important to ...
More