Skip to main content

Home/ Science Technology Society/ Group items tagged Security

Rss Feed Group items tagged

thinkahol *

Dr. Daniel G. Nocera - YouTube - 0 views

  •  
    The supply of secure, clean, sustainable energy is arguably the most important scientific and technical challenge facing humanity in the 21st century. Rising living standards of a growing world population will cause global energy consumption to double by mid-century and triple by the end of the century. Even in light of unprecedented conservation, the additional energy needed is simply not attainable from long discussed sources these include nuclear, biomass, wind, geothermal and hydroelectric. The global appetite for energy is simply too much. Petroleum-based fuel sources (i.e., coal, oil and gas) could be increased. However, deleterious consequences resulting from external drivers of economy, the environment, and global security dictate that this energy need be met by renewable and sustainable sources. The dramatic increase in global energy need is driven by 3 billion low-energy users in the non-legacy world and by 3 billion people yet to inhabit the planet over the next half century. The capture and storage of solar energy at the individual level personalized solar energy drives inextricably towards the heart of this energy challenge by addressing the triumvirate of secure, carbon neutral and plentiful energy. This talk will place the scale of the global energy issue in perspective and then discuss how personalized energy (especially for the non-legacy world) can provide a path to a solution to the global energy challenge. Daniel G. Nocera is the Henry Dreyfus Professor of Energy at the Massachusetts Institute of Technology, Director of the Solar Revolutions Project and Director of the Eni Solar Frontiers Center at MIT. His group pioneered studies of the basic mechanisms of energy conversion in biology and chemistry. He has recently accomplished a solar fuels process that captures many of the elements of photosynthesis outside of the leaf. This discovery sets the stage for a storage mechanism for the large scale, distributed, deployment of solar energy. He has b
James Hatch

Keeping your Windows Phone Secure - 0 views

  •  
    Windows 8 RTM for mobile devices has introduced some elevated security features. Through preeminent synchronizing capabilities, Microsoft empowers this operating system to become loyal with its users and help them keep their data safe and secure.
Aman Khani

Understanding IT Infrastructure Management Services - 2 views

  •  
    A perfect and flawless IT infrastructure needs the proper and secure setup of the resources such as hardware, software, storage and other applications. It can be done only by designing the infrastructure in a systematic way.
Nikhil Sahoo

Your own secured pocket server | Indiegogo - 0 views

  •  
    Pocket sized E-Mail server World's first ever private e-mail server that fits in your pocket. Hack free and Rent free cloud storage.
Infogreen Global

Quantum mechanics can offer a secure way of communicating - 0 views

  •  
    There are differences between the group's demonstrations. For crystals, Tittel's group used thulium-doped lithium niobate, whereas Gisin's group opted for neodymium-doped yttrium silicate. In addition, a different type of laser set-up has favoured Gisin's group, which reports a maximum storage time of some 200 ns at an efficiency of more than 20%; Tittel's group reports a storage time of 7 ns at an efficiency of 2%. On the other hand, the quantum memory of Tittel's group functions at a bandwidth of 5 GHz - some 40 times greater than Gisin's group - which means, potentially, far more information could be sent in the same time.
thinkahol *

It's Official: Tunisia Now Freer than the U.S. | Informed Comment - 0 views

  •  
    An Arab country with neither secret police nor censorship is unprecedented in recent decades. Tunisia is inspiring similar demands in Egypt and Jordan. When skeptics wonder if the Revolutions of 2011 would really change anything essential in the region, they would be wise to keep an eye on these two developments in Tunisia, which, if consolidated, would represent an epochal transformation of culture and politics. Arguably, Tunisians are now freer than Americans. The US government thinks our private emails are actually public. The FBI and NSA routinely read our email and they and other branches of the US government issue security letters in the place of warrants allowing them to tap phones and monitor whom we call, and even to call up our library records and conduct searches of our homes without telling us about it. Millions of telephone records were turned over to George W. Bush by our weaselly telecom companies. Courts allow government agents to sneak onto our property and put GPS tracking devices under our automobiles without so much as a warrant or even probable cause. Mr. Obama thinks this way of proceeding is a dandy idea.
thinkahol *

Sony network breach shows Amazon Cloud's appeal for hackers | KurzweilAI - 0 views

  •  
    The hackers that brought down Sony's Playstation Network for more than a month used stolen credit cards to rent computing power from Amazon's Elastic Computing Cloud (EC2) to carry out their attack. Personal information, credit cards, and passwords from millions of customers were seized by hackers during the attack. Because computing power can be rented from EC2 anonymously, hacking using the service can be hard to trace. Tracing the attack may require the FBI seeking a search warrant to access Amazon's detailed records of which IP addresses accessed the service at which time, and tracing those IP addresses to homes or businesses. The Playstation Network remains down in Japan due to government concerns over its security.
gowitetechie

Examples of AI | AI Applications - 0 views

  •  
    Artificial Intelligence has several applications in real life such as Customer Service, Human Resources, Logistics, E-commerce, and Cyber Security.
melvinahebert

Best Demat Account For Small Investors | TechQY - 0 views

  •  
    Full-service brokers with extensive technical proficiency and support, such as Kotak Securities, is highly recommended for beginners. This is because of their expertise and years of guidance in the field of trading that can provide you with immense knowledge and customer service in your trading journey. Let us look into the parameters and factors to help you decide the best Demat account for your investment.
janina saha

Close protection courses - 1 views

  •  
    A Close Protection personnel is a security operative or an agent who works closely with a person or persons to protect them, usually a public figure, wealthy, or politically important figure(s) from danger: generally, physical attack, harassment, loss of private information, bullying, or other criminal offences.
janina saha

Close protection courses - 0 views

Close protection courses

started by janina saha on 01 Nov 12 no follow-up yet
julia Dexter

How to Fix and Remove Nettraveler Infection - 0 views

  •  
    Nettraveler is a cyber-threat to the computers. It is an infection with high risk and capability to collapse the entire system, within no time. The intruder interferes into the system, steals significant and sensitive information, and reports this information to its users. It usually skins with frequently used applications or Windows processes to hide from security shields.
James Hatch

Learn How to Hide Files and Folders Using Command Prompt - 0 views

  •  
    This video entails a systematic procedure to hide files and folders using command prompt! Watch it now !! Download this free registry cleaner and make your PC faster Now !!
Nikhil Sahoo

Encrypted E-mail & Cloud Storage Pocket Sized Server - Rourkela TIPS - 0 views

  •  
    Introducing the first ever cloud storage with military grade, open source, and encrypted email that perfectly fits in your pocket sized server.
Sanny Y

The Number One Computer Tech Support Service - 1 views

Computer Tech Support Service offers the most outstanding computer support service. They have friendly computer support technicians who are very skilled in giving accurate and fast solutions to my ...

Computer support service

started by Sanny Y on 13 Sep 11 no follow-up yet
Todd Suomela

Strange New Air Force Facility Energizes Ionosphere, Fans Conspiracy Flames - 0 views

  •  
    About the High Frequency Active Auroral Research Program.
1 - 20 of 24 Next ›
Showing 20 items per page