These are the images from our known Universe.
Still GOD doesn’t Exist?












Source.
http://www.wired.com/wiredscience/2013/01/space-photo-of-the-day-2/?pid=5940
These are the images from our known Universe.
Still GOD doesn’t Exist?












Source.
http://www.wired.com/wiredscience/2013/01/space-photo-of-the-day-2/?pid=5940
NASA has sent the famous ‘Mona Lisa‘ painting to Moon by laser.
That’s some innovative thinking!
Story:
NASA Beams Mona Lisa to Lunar Reconnaissance Orbiter at the Moon.
As part of the first demonstration of laser communication with a satellite at the moon, scientists with NASA’s Lunar Reconnaissance Orbiter (LRO) beamed an image of the Mona Lisa to the spacecraft from Earth.
The iconic image traveled nearly 240,000 miles in digital form from the Next Generation Satellite Laser Ranging (NGSLR) station at NASA’s Goddard Space Flight Center in Greenbelt, Md., to the Lunar Orbiter Laser Altimeter (LOLA) instrument on the spacecraft. By transmitting the image piggyback on laser pulses that are routinely sent to track LOLA’s position, the team achieved simultaneous laser communication and tracking.

“This is the first time anyone has achieved one-way laser communication at planetary distances,” says LOLA’s principal investigator, David Smith of the Massachusetts Institute of Technology. “In the near future, this type of simple laser communication might serve as a backup for the radio communication that satellites use. In the more distant future, it may allow communication at higher data rates than present radio links can provide.”
Typically, satellites that go beyond Earth orbit use radio waves for tracking and communication. LRO is the only satellite in orbit around a body other than Earth to be tracked by laser as well.
“Because LRO is already set up to receive laser signals through the LOLA instrument, we had a unique opportunity to demonstrate one-way laser communication with a distant satellite,” says Xiaoli Sun, a LOLA scientist at NASA Goddard and lead author of the Optics Express paper, posted online today, that describes the work.
Precise timing was the key to transmitting the image. Sun and colleagues divided the Mona Lisa image into an array of 152 pixels by 200 pixels. Every pixel was converted into a shade of gray, represented by a number between zero and 4,095. Each pixel was transmitted by a laser pulse, with the pulse being fired in one of 4,096 possible time slots during a brief time window allotted for laser tracking. The complete image was transmitted at a data rate of about 300 bits per second.
The laser pulses were received by LRO’s LOLA instrument, which reconstructed the image based on the arrival times of the laser pulses from Earth. This was accomplished without interfering with LOLA’s primary task of mapping the moon’s elevation and terrain and NGSLR’s primary task of tracking LRO.
The success of the laser transmission was verified by returning the image to Earth using the spacecraft’s radio telemetry system.
Turbulence in Earth’s atmosphere introduced transmission errors even when the sky was clear. To overcome these effects, Sun and colleagues employed Reed-Solomon coding, which is the same type of error-correction code commonly used in CDs and DVDs. The experiments also provided statistics on the signal fluctuations due to Earth’s atmosphere.
http://www.nasa.gov/mission_pages/LRO/news/mona-lisa.html

As Information Technology advances and new security measures are put in place, comes the problem of securing the Privacy and safety of the data.
Reputed Service Providers are doing what they can.
However this problem persists.
The Hacker News has provide a Link for outlining the Essentials of Information Security.
“”The Essentials of Information Security Kit: Includes a Free PC Security Handbook – 2nd Edition eBook”
Download this kit to learn everything you need to know about Information Security.
Offered Free by: TradePub
Other Resources from: TradePub
This ebook can be downloaded at the Link.
http://thehackernews.tradepub.com/free/w_bund20/?p=w_bund20
It is a fact that the Human Brain is the most complicated Machinery in the world .
the Magnetic discharges of the Brain are the most intriguing.
While one keeps on trying to tame the brain by studying the Physical structure, it is time people scientists pay more attention to the Magnetic discharges as well.
Some inroads have been made in this area.
Now let’s see how the Brain can be hacked!
Story:
This new battlespace is not just about influencing hearts and minds with people seeking information. It’s about involuntarily penetrating, shaping, and coercing the mind in the ultimate realization of Clausewitz’s definition of war: compelling an adversary to submit to one’s will. And the most powerful tool in this war is brain-computer interface (BCI) technologies, which connect the human brain to devices.

(A brain–computer interface (BCI), often called a mind-machine interface (MMI), or sometimes called a direct neural interface or a brain–machine interface (BMI), is a direct communication pathway between the brain and an external device. BCIs are often directed at assisting, augmenting, or repairing human cognitive or sensory-motor functions.
Research on BCIs began in the 1970s at the University of California Los Angeles (UCLA) under a grant from the National Science Foundation, followed by a contract fromDARPA.[1][2] The papers published after this research also mark the first appearance of the expression brain–computer interface in scientific literature.
The field of BCI research and development has since focused primarily on neuroprosthetics applications that aim at restoring damaged hearing, sight and movement. Thanks to the remarkable cortical plasticity of the brain, signals from implanted prostheses can, after adaptation, be handled by the brain like natural sensor or effector channels.[3] Following years of animal experimentation, the first neuroprosthetic devices implanted in humans appeared in the mid-1990s.)
Current BCI work ranges from researchers compiling and interfacing neural data such as in the Human Conectome Project to work by scientists hardening the human brain against rubber hose cryptanalysis to technologists connecting the brain to robotic systems. While these groups are streamlining the BCI for either security or humanitarian purposes, the reality is that misapplication of such research and technology has significant implications for the future of warfare.
Where BCIs can provide opportunities for injured or disabled soldiers to remain on active duty post-injury, enable paralyzed individuals to use their brain to type, or allow amputees to feel usingbionic limbs, they can also be exploited if hacked. BCIs can be used to manipulate … or kill.
Recently, security expert Barnaby Jack demonstrated the vulnerability of biotechnological systems by highlighting how easilypacemakers and implantable cardioverter-defibrillators (ICDs) could be hacked, raising fears about the susceptibility of even life-saving biotechnological implants. This vulnerability could easily be extended to biotechnologies that connect directly to the brain, such as vagus nerve stimulation or deep-brain stimulation.
Related:
You must be logged in to post a comment.