As the Top Gear team once famously demonstrated, the motion of the ocean makes for a bone-jarringly rough ride the faster you move across its surface. However aboard this prototype catamaran from Nauti-Craft, you'll barely feel the rolling of the waves at any knot.

...








-- For more information read the original article here.

If Google continues to move forward with self-driving cars, the company could pose a serious threat to the auto industry, General Motors global product chief Mark Reuss told Bloomberg.

Even though GM is working on its own autonomous cars, Reuss told reporters yesterday that GM is not directly in a race against Google.

“Anybody can do anything with enough time and money,” Reuss said. “If they set their mind to it, I have no doubt [that Google could become] a very serious competitive threat.”

Still, Reuss doesn't envision autonomous cars taking over cities "anytime soon."

On Tuesday, Google revealed a prototype driverless car without pedals, breaks, or a steering wheel. Google plans to deploy at least 100 of these this year.

Since launching the driverless car program in 2009, Google's cars have logged over 700,000 miles. It also recently set out to tackle autonomous driving on city streets.

SEE ALSO: Taxi Drivers Are Threatening To Shut Down Central London In Protest Of Uber

Join the conversation about this story »








-- For more information read the original article here.

Physicists at the Kavli Institute of Nanoscience at the Delft University of Technology in the Netherlands were able to successfully "teleport" information over a distance of 10 feet, reports the New York Times.

There's a lot going on in that idea, so let's break it down.

The rules for the subatomic world are totally unlike the rules for our macroscopic world. A particle can be in multiple places at the same time, and can even disappear on one side of a barrier and reappear on the other side without actually traveling through it. This comes from quantum theory, and while it sounds totally nonintuitive, it's one of the most successful models physicists have for understanding our world.

Many scientists around the world today are working to develop "quantum technology," which is simply any technology that hinges upon these totally "abnormal" properties of the super-small stuff that makes up our world. The Mount Everest of quantum technology would be to build a quantum computer that could quickly solve problems that would leave our classical computers stumped. Instead of the standard bits we use in computers today — ones and zeroes — quantum bits, or "qubits," can describe a one, a zero, or any value in between.

If this all sounds crazy or hard to understand, you're in good company with a lot of smart people. Hang in there. A legitimate, functional quantum computer (it's debatable as to if one has actually been built yet) would be absolutely bursting with computational potential.

Back to our Dutch scientists — they trapped qubits in diamonds and were able to establish a measurement of the qubits' spin. This measurement is the acual information that was "teleported," by way of a process called quantum entanglement. To simplify this idea a lot, entanglement is essentially what happens when one particle copycats another, even over a distance. Change the spin of one particle, the other instantly changes its spin to match.

Einstein famously decried entanglement, calling it "spooky action at a distance." But repeated variations of this experiment only lend more credence to it as a completely valid natural phenomena that we are slowly learning to manipulate.

Forget Google Fiber. Once this stuff is perfected, a quantum internet that's built upon it could mean instantaneous transmission and receipt of data around the world or even the universe! In 1964, an Irish physicist named John Bell -- For more information read the original article here.

Magic floors that sink into the ground to create a pool are always cool but even those trick pools aren't as camouflage as this hidden pool. What looks like a seemingly normal backyard can actually transform into a pool when half the grass retracts to reveal the water. Fun!

...








-- For more information read the original article here.

When it comes to cyber security, the Defense Department has their work cut out for them. Hackers, adversaries, network security breaches, information obfuscation and confiscation – these are just a few of the constant threats to our military and government networks. In defense against these dangers, DARPA is doing their part to ensure network protection and information security.

And they're using FOUR BIG THINGS to do it.

(DoD graphic illustration by Jessica L. Tozer/Released)

These four revolutionary programs will teach computers to think and learn. They will stop hackers in their digital tracks. They're going to make the future more exciting, and more innovative, than ever before.

“I really think there are two wars that are happening,” says Dan Kaufman, DARPA's Information Innovation Office director. “The one war, which we're sort of familiar with [is] the kinetic war. On the network warfare, I think it's sort of a new war. It's this crossover between criminal organizations and terrorists organizations.”

So let's talk cyber warfare.

When you hear about cyber stuff, most people tend to think about their PC, or their home computer system. That's obviously important, but it's not even the half of it. In fact, about 98% of microprocessors are embedded, Dan says.

“Think about it: everything in the world today has a computer. Your phone, your TV, your insulin pumps, all our weapons systems. These are all computerized and DARPA sees huge promise in it. We get these wonderful benefits from network technology.”

But how are they going to protect these systems? So glad you asked…

The FIRST BIG THING is called HACMS (pronounced like “Hack 'ems”). It stands for High-assurance Cyber Military Systems.

“Think about computers,” Dan says. “A computer is the only thing that we buy today where the day you buy it, it's fundamentally broken.”

What he means by that is this:

When you buy your computer, one of the first things they tell you is to “go home and patch it.”
“Well okay,” you might say, “but didn't I just pay you three-thousand dollars?”
So you patch it, and you say, “Now it's fixed.”
And they say “No, next Tuesday there will be more patches.”
You say, “Will it ever be fixed?”
They say “No.”

That's a little bit crazy, don't you think? DARPA does, too.

“If you think about this even broader,” Dan continues, “how are we going to apply -- For more information read the original article here.

Apple has responded to reports of primarily Australian OS X and iOS users finding devices "hacked" and locked out by miscreants abusing the "Find My iPhone" feature. Apple has issued a statement on the matter, denying the potential of iCloud security having been breached, and suggesting users change Apple ID passwords and avoid re-using credentials across multiple sites....






-- For more information read the original article here.
The government should sponsor a national body to ensure cyber professionals are qualified for their jobs, a military expert says. -- For more information read the original article here.

Australian blog MacFixIt has gotten its hands on what it claims is the upcoming iPhone 6, leaked by "sources inside the supply chain"— and it seems to reaffirm the shape hinted at by earlier rumors .

...








-- For more information read the original article here.
In the early 1980s, noted industrial designer Hartmut Esslinger began working with Apple where he and his consultancy firm "Frog Design" helped shape the look and feel of Apple products for a number of years. Most notably, Esslinger is credited with... -- For more information read the original article here.
A staff technologist for the Electronic Frontier Foundation has stumbled across a cookie that Wordpress.com uses to transmit login credentials in plain text to the authentication endpoint, leaving sites open to simple hijacking attempts. Yan Zhu posted about the discovery, detailing the information about how the information in the cookie could be used to access another's site if intercepted....






-- For more information read the original article here.
Click to access the login or register cheese