Microsoft Research and MIT Media Lab recently introduced a new product called DuoSkin. DuoSkin is basically a temporary tattoo that will allow you to control connected interfaces. For example, you can use it to control a game or even your smartphone. Additionally, you can use DuoSkin as an NFC tag, which you can easily use with your smartphone.
IBM Watson is a cognitive system that''s ushering in the new era of cognitive business. Recently, a group of battered science fiction bots spoke about their yen to take over the world and their dislike for working with humans. Unlike them, Watson works with humans to out-think competitors, challenges, limits.
Two-factor authentication adds an extra layer of security by asking you to provide two forms of identification before you can access your personal information. The first is your usual user ID and password. The second is typically a unique code that is sent to your phone or some other physical device, that you then enter during the second stage of the login process. Because the second identifier is sent to something that you physically carry with you, it makes it harder for hackers to access your information.
Apple: Apple sends a four-digit code via SMS or Find My iPhone to register your machine as a trusted device. Anytime you try to access your iCloud or iTunes account from a new device, you’ll be required to enter a new four-digit passcode. Instructions on how to enable two-step verification for your Apple ID are here.
Google: Google can send verification codes in several different ways: SMS, voice call, or through its Google Authenticator app. During initial sign-in, you can tell Google to remember your device for 30 days. But a new code is required anytime someone tries to log in from a new machine.
Yahoo Mail: Once two-step authentication is activated, Yahoo will send a passcode via text or voice call. The verification process will only occur whenever you’re logging in from a new computer or mobile device, or if you’ve cleared your browser’s cache.
Facebook: Facebook offers login approvals, which require you to enter a passcode anytime you try to log in from an unrecognized computer or mobile phone. Codes are sent via text message.
Twitter: Twitter will send a verification code via text or as a push notification on iOS and Android devices. The company also provides a backup code, so that in the event that you lose your phone, you can enter the backup code to log in to your account. This isn’t saved anywhere, so be sure to write it down someplace.
Dropbox: Like the others, you’ll receive a code anytime you try to access Dropbox from a new machine. They can be sent via text, or you can use an app like Google Authenticator or Duo Mobile. The company also provides a 16-digit backup code in case you lose your phone or for some reason can’t receive a PIN using the aforementioned methods. Again, write it down somewhere safe.
OneDrive: You can receive codes from Microsoft via text, email or authenticator app. A PIN is only required when you sign in from an untrusted device. Instructions on how to enable two-step verification are available here.
The DRC is a competition of robot systems and software teams vying to develop robots capable of assisting humans in responding to natural and man-made disasters. It was designed to be extremely difficult. Participating teams, represent some of the most advanced robotics research and development organizations in the world, To qualify for the DRC Finals, the teams had to submit videos showing successful completion of five sample tasks: engage an emergency shut-off switch, get up from a prone position, loco-mote ten meters without falling, pass over a barrier, and rotate a circular valve 360 degrees. 25 teams will compete during the two-day event, to be held June 5-6, 2015, at Fairplex in Pomona, California. DARPA Robotics Challenge
In a report issued last month, a team of scientists from the Netherlands is proposing a security system for credit cards and passports that would leverage the power of quantum physics. Dubbed quantum-secure authentication (QSA), the technology uses a strip of nanoparticles on the card that would be virtually impossible to hack. Read on...
In this video, the pilot is itself a humanoid robot, learning how to fly an airplane in a flight simulator. With a panel of controls in its mechanical fingers, the PIBOT uses visual information, presented on a computer monitor, to inform its flying. Right now, the concept is limited to piloting simulators, but the researchers hope to have PIBOT actually steer a plane some day.