Post has attachment
Sixth-, seventh- and eighth-generation Core chips (Skylake, Kaby Lake and Kaby Lake R), along with Pentium, Celeron, Atom and multiple Xeon chips, have a security flaw in their Management Engine. Security researchers have identified several ways someone could take advantage of them to take over systems, but there is some good news: Only one of the vulnerabilities can be exploited remotely. Still, PC makers are working on firmware updates to patch the holes, so keep an eye out for updates coming soon.
Add a comment...

Post has shared content
Add a comment...

Post has shared content

Post has attachment
They are designing an artificial system that mimics how plants and other photosynthetic organisms use sunlight to convert CO2 and water into molecules that humans can later use for fuel.

As in plants, their system consists of two linked chemical reactions: one that splits H2O into protons and oxygen gas, and another that converts CO2 into carbon monoxide, or CO. (The CO can then be converted into hydrocarbon fuels through an established industrial process called Fischer-Tropsch synthesis.)
...
In the paper, the team reports the overall electrical-to-chemical power conversion efficiency of the system at 64 per cent. According to De Luna, this is the highest value ever achieved for such a system, including their previous one, which only reached 54 per cent.

The new catalyst is made of nickel, iron, cobalt and phosphorus, all elements that are low-cost and pose few safety hazards. It can be synthesized at room temperature using relatively inexpensive equipment, and the team showed that it remained stable as long as they tested it, a total of 100 hours.
Add a comment...

Post has attachment
Many of the young people who attend my classes think that philosophy is a fuzzy discipline that’s concerned only with matters of opinion, whereas science is in the business of discovering facts, delivering proofs, and disseminating objective truths. Furthermore, many of them believe that scientists can answer philosophical questions, but philosophers have no business weighing in on scientific ones.

Why do college students so often treat philosophy as wholly distinct from and subordinate to science? In my experience, four reasons stand out.
Add a comment...

Post has attachment
Add a comment...

Post has shared content
Under the plan, Foxconn will equip 1990s-era buildings in the Yangpu district with the latest smoke-detection systems to improve fire safety, and facial-recognition software that can identify and flag potential intruders using data from a central control room, according to Wu Renjie, the executive director of Foxconn’s cloud and network business unit.
Add a comment...

Post has shared content
A Gentle Intro to Transfer Learning

Nowadays most applications of Deep Learning rely on Transfer Learning. This is especially true in the domain of Computer Vision. We will explore what Transfer Learning is, how to do it and what the potential pitfalls are. To do this, we’ll go on a little startup quest....The idea is to take the knowledge learned in a model and apply it to another task. Transfer learning sounds like what we want to do. We decide to reuse the already trained Pet-cognizer®. Scenario 1: New dataset is similar to initial dataset: Our new breed dataset is close to the ImageNet dataset we first trained on. It’s similar in the sense that they both contain pictures of the “real world” (as opposed to images of documents or medical scans). Thus the filters in the CNN can be reused, and we don’t have to learn them again. For Breed-cognizer®, we swap the only the last layer. Instead of telling us what animal is in the picture, it will give us probabilities for each dog breed . Because the weights on the last layer are initially random we have to train it. But training these random weights might also change the great filters in the earlier layers. To avoid this, we freeze all layers but the last. Freezing means that the layer weights won’t be updated during training. Rather miraculously, this works to an extent. We are able to achieve 80% accuracy on over 120 classes, just by training the last layer.
Add a comment...

Post has shared content
Meet the YellowBox—introducing the Media Lab’s brand-new cleanroom, built to facilitate the work of the Conformable Decoders group creating unusual electromechanical and electrochemical systems at micro- and nanoscale.
Add a comment...

Post has attachment
Phone companies are now authorized to be more aggressive in blocking robocalls before they reach customers' landlines or mobile phones, but you might have to pay for the new blocking capabilities.

The Federal Communications Commission yesterday issued an order to "expressly authorize voice service providers to block robocalls that appear to be from telephone numbers that do not or cannot make outgoing calls, without running afoul of the FCC's call completion rules."

Carriers will thus have greater ability to block calls in which the Caller ID has been spoofed or in which the number is invalid. Caller ID spoofing hides the caller's true identity and is one of the biggest sources of illegal robocalls.
Add a comment...
Wait while more posts are being loaded