2008 Technology Advances Winners and Losers IEEE Spectrum January 2009 Issue.

Slides:



Advertisements
Similar presentations
Electromagnetic Waves & the Electromagnetic Spectrum
Advertisements

Mapping with the Electronic Spectrum
Electromagnetic Waves
Light and Color Chapters 27 – 28 Created by N. Ferreira with the help of A, Kirby.
Light and Color Chapters 27 – 28
Direct Attacks on Computational Devices
William Herschel measured the temperature of different colors of light
Chapter 4 Electron Configurations By Mr. English.
Electromagnetic Waves
What is light? An electromagnetic wave that can be seen by the human eye. Can travel either in matter or empty space.
ELECTROMAGNETIC WAVES
Can Computers Think?  Guess what? We are not the first to ask this question.  Suppose you answer “yes”. Brings up other questions, e.g., should computers.
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
Bluetooth What is it and where is it going?. Background…..   Conceived initially by Ericsson, before being adopted by a myriad of other companies, Bluetooth.
Light and sound are the two major ways that we receive information about the world. Of the two, light provides the greater variety of information. The.
Applied Cryptography Chapter 1 Foundations Jaewon Lee.
Electromagnetic Waves & the Electromagnetic Spectrum.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Mobile phones have changed our way of life but are they safe? Mobile phones were introduced in the 1990’s. They are now more than a million in use. In.
Light The only thing we see! buckleyc/light.htm.
Unit 11 Lesson 5 Light Technology Copyright © Houghton Mifflin Harcourt Publishing Company.
The Electromagnetic Spectrum (EMS). Electromagnetic Wave An electromagnetic wave is a transverse wave that carries electrical and magnetic energy. The.
ELECTROMAGNETIC SPECTRUM.  Water and sound waves transfer energy from one place to another- they require a medium through which to travel. They are mechanical.
Thoughts about Trends1 Chapter 5: How to Think about Trends R. W. Hamming (from Beyond Calculation)
Energy to See By 1.  Alien Attack Website: alienattack.htm 2.
Cryptography By, Anthony Lonigro & Valentine Mbah.
Prosthetic Limbs By Philip A. Blair. Overview Prosthetics combines three main subjects: – Biology How the body connects to the synthetic limb. – Technology.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
David Westenberger Lucas Zurek. What’s Happening Now? Silicon-based Computation – Moore’s Law Transistors Physical limitation Then what’s next?
remote sensing electromagnetic spectrum frequency Landsat satellite Objectives Compare and contrast the different forms of radiation in the electromagnetic.
As an object gets hot, it gives Off energy in the form of Electromagnetic radiation.
Philosophy 4610 Philosophy of Mind Week 8: Can a Computer Think?
The Wave – Particle Duality OR. Light Waves Until about 1900, the classical wave theory of light described most observed phenomenon. Light waves: Characterized.
Quantum Computing by Mathew Ross Jared Davis - Group L -
Week 4 - Friday.  What did we talk about last time?  Snow day  But you should have read about  Key management.
Nawaf M Albadia
Chapter 3: The Electromagnetic Spectrum
Cryptography and Its Algorithms Scott Chappell. What is Cryptography?  Definition: the art of writing or solving codes.
Electron Configuration Chemistry. Chapter 4 – Section 1 The Development of a New Atomic Model.
We see light as color and brightness It’s actually electromagnetic radiation: Partly electric, partly magnetic Flows in straight line (radiates)
Chapter 14 Sound and Light Energy
DES: Data Encryption Standard
Philosophy 1050: Introduction to Philosophy Week 13: AI in the Real World and Review.
BRAIN GATE TECHNOLOGY.. Brain gate is a brain implant system developed by the bio-tech company Cyberkinetics in 2003 in conjunction with the Department.
The Invisible Universe Prof. Lynn Cominsky Sonoma State University.
Time Zones Because Earth takes about 24 hours to rotate once on its axis, it is divided into 24 times zones, each representing a different hour. Latitude.
Brain Chip Technology | Presented to- Dr. Jia Uddin, BRAC University 2 Dung Beetle, Can lift upto 1141 times of it’s own body weight..
Quantum Computers: The hope of daily Life By: Ashutosh Rai.
AIM: How was the Universe Created? Do Now: Which planet has the shortest day? Which planet rotates on its side? Which planet has the longest rotation?
QUANTUM COMPUTING By Sandeep Neeli.
CS 101 History and Basics.
By BIJAY ACHARYA Twitter.com/acharya_bijay
Unit 3 Lesson 5 Light Technology
Chapter 3– Electromagnetic Waves
Light Energy Science January 2013.
The Electromagnetic Spectrum
Electromagnetic Waves
Light By Mike Maloney.
Electromagnetic Waves & the Electromagnetic Spectrum
Electromagnetic Waves & the Electromagnetic Spectrum
The Electromagnetic Spectrum
WELCOME 1BY NAZNI PRAWEEN. 2 Light By NAZNI PRAWEEN 3BY NAZNI PRAWEEN.
Science Vocabulary 3 Week 5-6
Electromagnetic Waves
Light. What is LIGHT? WHERE DOES IT COME FROM? What is Light? Light is a wave, or rather acts like a wave. How do we know? –Reflection –Refraction –Dispersion.
Unit 3 Lesson 5 Light Technology
Electromagnetic Waves & the Electromagnetic Spectrum
Radio Waves -Longest wavelength of the electromagnetic spectrum
What is keystroke logging?
Communications.
Presentation transcript:

2008 Technology Advances Winners and Losers IEEE Spectrum January 2009 Issue

2 The Trouble With Touch Screen

3 Scientists search for a replacement for indium-tin oxide, a transparent conductor that’s vanishing fast. The price of the metal has shot up from around US $100 per kilogram to nearly US $1000 in the past six years.

4 Cryptographers Take on Quantum Computers

5 Cryptographers Take on Quantum Computers Software updates, , online banking, and the entire realm of public-key cryptography and digital signatures rely on just two cryptography schemes to keep them secure – RSA and Elliptic-Curve Cryptography (ECC). The reason that quantum computers are such a threat to RSA and ECC is that such machines compute using quantum physics. Unlike a classical computer, in which a bit can represent either 1 or 0, in a quantum computer a bit can represent 1 or 0 or a mixture of the two at the same time, letting the computer perform many computations simultaneously. That would shorten the time needed to break a strong 1024-bit RSA code from billions of years to a matter of minutes.

6 Sound Waves For Brain Waves

7 Researchers at Arizona State University at Tempe have developed a new use for ultrasound – to control brain activity from outside the skull. Ultrasound will someday allow physicians to substitute neural implants with external devices. - William J. Tyler, Assistant Prof, Ariz. State Univ.

8 Carbon in Bloom

9 Although a single nanotube is too tiny for a 30X stereo microscope to resolve, particles that make up the forest canopy are visible in the photo. They are in a slightly liquid state, giving off, energy – and a special microscope attachment – is responsible for the way patters, the balloonlike shape, and the bright glowing colors.

10 A Self-made Machine RepRap, a new open-source hardware project, goes a long way toward fulfilling the dream of self-replicating machines.

11 Multicore Made Simple Intel’s Larrabee is a chip every designer already knows how to program.

12 Mental Block Emotive says its game controller works at the speed of thought, but it doesn’t.

13 The Revolution will be Prosthetized DARPA’s prosthetic arm gives amputees new hope.

14 That Sinking Feeling In the teeth of a global recession, an aquatic-car company ramps up to enter a market that’s never made money.

15 Brew, Baby, Brew A backyard still that turns sugar into Ethanol fuel may look sweet, but under scrutiny it turns sour.

16 Living Machines

17 Attacking Keyboards “Keyboards are not safe for transmit information.” – Swiss security researchers developed four attacks that can detect what a person is typing on a keyboard by analyzing the signals produced by keystrokes. The researchers used a radio antenna to ‘fully or partially recover keystrokes” by spotting the electromagnetic radiation emitted when the keys were pressed.

18 Human or Not “Am I conversing with a human or a computer?” – In 1950, Alan M. Turing suggested that a computer could be said to be thinking if, in a text-based conversation, its responses are indistinguishable from a human’s. His prediction was that by the end of the 20 th century, computers would have a 30% chance of being mistaken for a human in a five- minute text-based conversation. In the 18 th Loebner Prize competition, ELBOT, one of six programs, nearly passed the Turing test, tricking 25% of judges into believing that it was human. Each of the six programs fooled at least one judge.