Category: 3. Tech

  • Asteroid’s Tail Observed to be Made of Sodium Gas, Not Dust

    Asteroid’s Tail Observed to be Made of Sodium Gas, Not Dust

    While the planets and moons of our solar system garner frequent attention from the scientific community, asteroids and comets also get spotlight from time to time. Not just because their compositions comprise pieces of the early formation of our solar system, but they also serve as intriguing visual phenomenon, as well. This especially true with…

  • How to use Android’s Nearby Share on a PC

    How to use Android’s Nearby Share on a PC

    Android users are proud of our devices’ versatility, but many of us have been low-key jealous of Apple’s AirDrop, which allows iPhones, iPads, and Mac computers to seamlessly swap files within a certain physical distance. Google, naturally, came up with its own version of the feature—Nearby Share—but until recently it was only available on the…

  • Improving Performance and Lifetime – Scientists Solve Battery Mystery

    Improving Performance and Lifetime – Scientists Solve Battery Mystery

    KIT researchers used simulations to characterize the formation of the solid electrolyte interphase. Credit: Christine Heinrich Researchers at KIT have characterized the chemical processes occurring at the electrodes of lithium-ion batteries. Lithium-ion batteries have become a crucial part of our daily lives, and they function thanks to the formation of a passivation layer during their…

  • Microsoft expands AI access to public

    Microsoft expands AI access to public

    Microsoft corporate vice president Yusuf Mehdi says the firm has done away with a waitlist and made generative AI features available to anyone using a Microsoft account. Microsoft on Thursday expanded public access to its generative artificial intelligence programs, despite fears that tech firms are rushing ahead too quickly with potentially dangerous technology. … Continue…

  • Hate passwords? You’re in luck—Google is sidelining them

    A cursor moves over Google’s search engine page, Aug. 28, 2018, in Portland, Ore. Good news for all the password-haters out there: Google has taken a big step toward making them an afterthought by adding “passkeys” as a more straightforward and secure way to log into its services. Credit: AP Photo/Don Ryan, File Good news…

  • Utah law requiring porn sites verify user ages takes effect

    Utah law requiring porn sites verify user ages takes effect

    Republican state Sen. Todd Weiler looks on as he sits on the Senate floor on March 2, 2023, at the Utah State Capitol in Salt Lake City. A law requiring porn sites verify the age of their users takes effect on Wednesday, May 3, 2023, in Utah, a deeply conservative state where politics and culture…

  • Ransomware attack affects Dallas police, court websites

    Ransomware attack affects Dallas police, court websites

    An American and Texas flag sit at half-staff outside of the Dallas Police Department headquarters, July 8, 2016, in Dallas. Dallas was hit with a computer ransomware attack that affected various websites, including the police department and municipal court, officials said Wednesday, May 3, 2023. Credit: AP Photo/Tony Gutierrez, File Dallas was hit with a…

  • Scientists Shine a Light Into the “Black Box” of AI

    Scientists Shine a Light Into the “Black Box” of AI

    Researchers have developed an innovative method to assess the interpretability of AI technologies, improving transparency and trust in AI-driven diagnostic and predictive tools. The approach helps users understand the inner workings of “black box” AI algorithms, particularly in high-stakes medical applications and in the context of the forthcoming European Union Artificial Intelligence Act. A team…

  • AMD fTPM vulnerability uncovered

    AMD fTPM vulnerability uncovered

    Attack setup on a Lenovo Ideapad 5 Pro-16ACH6. Credit: arXiv (2023). DOI: 10.48550/arxiv.2304.14717 Researchers at the Technical University of Berlin say they uncovered a new vulnerability in AMD’s Trusted Platform Module (TPM). The flaw exposes firmware TPMs, or fTPMs, to attack. This allows for extraction of cryptographic data stored in the fTPM, bypassing… Continue Reading…

  • Engineers try to squeeze energy from discarded fruit using microbial fuel cells

    UBCO researchers are looking at ways to convert rotting fruit into energy. Credit: Joshua Hoehne on Unsplash When Doc Brown fed his DeLorean food scraps in Back to the Future as fuel, it seemed like crazy science fiction. Now science is taking over that fiction as UBC Okanagan researchers are looking at the potential of…