Thursday, March 26, 2009

Wireless Power

Suntower


Physicist Marin Soljacic is working toward a world of wireless electricity.

In the late 19th century, the realization that electricity could be coaxed to light up a bulb prompted a mad dash to determine the best way to distribute it. At the head of the pack was inventor Nikola Tesla, who had a grand scheme to beam elec­tricity around the world. Having difficulty imagining a vast infrastructure of wires extending into every city, building, and room, Tesla figured that wireless was the way to go. He drew up plans for a tower, about 57 meters tall, that he claimed would transmit power to points kilometers away, and even started to build one on Long Island. Though his team did some tests, funding ran out before the tower was completed. The promise of airborne power faded rapidly as the industrial world proved willing to wire up.

Then, a few years ago, Marin Soljačić, an assistant professor of physics at MIT, was dragged out of bed by the insistent beeping of a cell phone. "This one didn't want to stop until you plugged it in for charging," says Soljačić. In his exhausted state, he wished the phone would just begin charging itself as soon as it was brought into the house.

So Soljačić started searching for ways to transmit power wirelessly. Instead of pursuing a long-distance scheme like Tesla's, he decided to look for midrange power transmission methods that could charge--or even power--portabl­e devices such as cell phones, PDAs, and laptops. He considered using radio waves, which effectively send information through the air, but found that most of their energy would be lost in space. More-targeted methods like lasers require a clear line of sight--and could have harmful effects on anything in their way. So Soljačić sought a method that was both efficient--able to directly power receivers without dissipating energy to the surrounding­s--and safe.

He eventually landed on the phenome­non of resonant coupling, in which two objects tuned to the same frequency exchange energy strongly but interact only weakly with other objects. A classic example is a set of wine glasses, each filled to a different level so that it vibrates at a different sound frequency. If a singer hits a pitch that matches the frequency of one glass, the glass might absorb so much acoustic energy that it will shatter; the other glasses remain unaffected.

Soljačić found magnetic resonance a promising means of electricity transfer because magnetic fields travel freely through air yet have little effect on the environment or, at the appropriate frequencies, on living beings. Working with MIT physics professors John Joannopoulos and Peter Fisher and three students, he devised a simple setup that wirelessly powered a 60-watt light bulb.

The researchers built two resonant copper coils and hung them from the ceiling, about two meters apart. When they plugged one coil into the wall, alternating current flowed through it, creating a magnetic field. The second coil, tuned to the same frequency and hooked to a light bulb, reso­nated with the magnetic field, generating an electric current that lit up the bulb--even with a thin wall between the coils.

So far, the most effective setup consists of 60-centimeter copper coils and a 10-megahertz magnetic field; this transfers power over a distance of two meters with about 50 percent efficiency. The team is looking at silver and other materials to decrease coil size and boost efficiency. "While ideally it would be nice to have efficiencies at 100 percent, realistically, 70 to 80 percent could be possible for a typical application," says Soljačić.



Wireless Light

Marin Soljačić and colleagues used magnetic resonance coupling to power a 60-watt light bulb. Tuned to the same frequency, two 60-centimeter copper coils can transmit electricity over a distance of two meters, through the air and around an obstacle.

1. Resonant copper coil attached to frequency converter and plugged into outlet
2. Wall outlet
3. Obstacle
4. Resonant copper coil attached to light bulb

Other means of recharging batteries without cords are emerging. Startups such as Powercast, Fulton Innovation, and WildCharge have begun marketing adapters and pads that allow consumers to wirelessly recharge cell phones, MP3 players, and other devices at home or, in some cases, in the car. But Soljačić's technique differs from these approaches in that it might one day enable devices to recharge automatically, without the use of pads, whenever they come within range of a wireless transmitter.

The MIT work has attracted the attention of consumer-electronics companies and the auto industry. The U.S. Department of Defense, which is funding the research, hopes it will also give soldiers a way to automatically recharge batteries. However, Soljačić remains tight-lipped about possible industry collaborations.

"In today's battery-operated world, there are so many potential applications where this might be useful," he says. "It's a powerful concept."

Wednesday, March 25, 2009

Intel Releases Draft USB 3.0 Spec

usb-3_0

Intel has released part of the draft specification for USB 3.0, a move that could speed up the release of the next-generation data transfer standard.

The Extensible Host Controller Interface (xHCI) draft specification revision 0.9 is available under royalty free licensing terms to all USB 3.0 Promoter Group members, and AMD, Dell, Microsoft and NEC were among those to back the move, according to Intel.

USB 3.0 -- also known as SuperSpeed USB -- is expected to enable transfer speeds of up to 4.8Gbps, a significant leap from the 480Mbps supported by the current USB 2.0 spec.



"The future of computing and consumer devices is increasingly visual and bandwidth intensive," said Phil Eisler, corporate vice president at Intel rival AMD.

"Lifestyles filled with [high-definition] media and digital audio demand quick and universal data transfer. USB 3.0 is an answer to the future bandwidth need of the PC platform. AMD believes strongly in open industry standards, and therefore is supporting a common xHCI specification."

Intel said it expects to release a revised xHCI 0.95 specification in the fourth quarter, and the technology should become widely available in 2010.

usb3

The chip giant announced plans to release more details on the USB 3.0 spec earlier this year.

In June, Intel spokesman Nick Knupffer said on his blog: "The sooner USB 3.0 hits the market, the sooner all you readers will be flooding your devices and hard drives with insanely large files requiring masses amounts of computational resources, improving your lives, and making you pleased that you bought a quad-core processor."

Source

Hacking with a Pringles tube

_1860241_pringle-isec300
A crisp can is an effective tool for curious hackers

Empty cans of Pringles crisps could be helping malicious hackers spot wireless networks that are open to attack.

Security company i-sec has demonstrated that a directional antenna made with a Pringles can significantly improves the chances of finding the wireless computer networks being used in London's financial district.

An informal survey carried out by i-sec using the homemade antenna has found that over two-thirds of networks were doing nothing to protect themselves.

The security firm said all the companies at risk could easily thwart anyone that wanted to find and penetrate their network by making a few simple changes to the hardware used to build the wireless networks.

Hack here

In November last year BBC News Online was shown just how easy it is to find and gain information about wireless networks.

These networks are rapidly becoming popular because they are cheap, easy to set up and replace the unsightly cables that many companies have used to link PCs together into networks.

But the convenience of using radio waves to transfer data between machines is not without its risks.

Many curious hackers have started carrying out so-called war-driving expeditions.

US security expert Peter Shipley invented the practice. It involves driving around an area using a laptop fitted with a wireless network card to find and map out the networks.

Crisp signal

_36202803_pringles150
Pringles tube works as an antenna

Wireless, or WiFi, networks have an encryption system built in, but it is not turned on when the basic hardware of the network is set up.

"People have made these antenna out of Pringles tubes, coffee cans and even old satellite dishes"
Geoff Davis, i-sec


Geoff Davies, managing director of i-sec, said its informal survey revealed that 67% of the networks it found had this encryption system turned off.

"Many companies are going out and buying a wireless access point to see what it can do," said Mr Davies. "The problem is that they have opened a great big back door into their network."

He said that i-sec had boosted the chance of spotting networks by converting an empty can of Pringles into a directional, or Yagi, antenna. Plans to make such an antenna first appeared on the net last year.

Properly made, such an antenna can boost signal strengths by up to 15 decibels, vastly aiding the discovery of wireless networks.

Potential for havoc

In one 30-minute journey using the Pringles can antenna, witnessed by BBC News Online, i-sec managed to find almost 60 wireless networks.

"Those doing [war-driving] are not necessarily looking to take down corporate networks, they are looking to use corporate bandwidth," said Mr Davies.

"But if they are doing that then someone with more nefarious purpose could wreak havoc."

Mr Davies said that a few basic steps such as changing default names, moving wireless access points to the centre of a building and switching off the networks' broadcast functions could help significantly improve the security of these systems.

Avoid email embarrassment with Gmail

Have you ever sent an email that only seconds later you wish you hadn’t? Sending an embarrassing message to the wrong person with the same first name can happen without warning too. Thankfully, hitting the send button, and the feeling of panic almost happen simultaneously.

Gmail now lets you “undo” a sent message with one of their newest Labs features. Enable the feature by clicking on the labs icon at the top of your Gmail (beside settings), and click the “enable” option beside the “Undo Send” experiment.

After enabling this feature, you will notice an “undo” link above your inbox for 5 seconds after sending a message — that might not be enough time in some situations, but it’s better than nothing!

In addition to this feature, there were also some other new experiments that may interest you — they include inline YouTube, Picasa, Flicker, and Yelp previews.

What do you think of these new features?


Source

Nasa hacker: I’m safe until prosecution decision



Nasa hacker Gary McKinnon has said he is ’safe’ until the director of public prosecutions makes a decision about whether to prosecute him in the UK.

At the Royal Courts of Justice on Tuesday, McKinnon told ZDNet UK that home secretary Jacqui Smith had decided not to extradite the self-confessed hacker to the US to face charges of hacking military networks until Keir Starmer, the director of public prosecutions, had decided whether to prosecute McKinnon in the UK. Starmer will reach a decision within four weeks.

“I’m safe until the director of public prosecutions makes his decision,” said McKinnon. “Nice one. It’s such a relief.”

Before hearing the news, McKinnon faced the prospect of extradition to the US within a few days. If found guilty of hacking military systems and endangering national security by a US court, McKinnon could face up to 70 years in a maximum security prison.


A UK prosecution would enable McKinnon to avoid extradition to the US. McKinnon is accused of hacking into 97 US military computers, which he has never denied. He does deny US prosecution allegations that he caused over $700,000 (£430,000) worth of damage to military systems by deleting files.

In the UK, McKinnon could be prosecuted under the Computer Misuse Act. In late December McKinnon sent a letter to Starmer, confessing to offences under section 2 of the Computer Misuse Act, which involves unauthorised access to computer systems with intent to commit further offences. This offence carries a maximum penalty of five years’ imprisonment.

In addition to asking Starmer to prosecute McKinnon in the UK, McKinnon’s solicitor Todner also requested in January that foreign secretary David Miliband press outgoing US president George Bush for a pardon for McKinnon, or at least that McKinnon be prosecuted in the UK.

Todner told ZDNet UK on Tuesday that she had heard nothing from either Miliband or the US authorities, but would make the same request of Barack Obama, who was inaugurated as US president on Tuesday.

“I don’t think he can be pardoned,” said Todner. “What I want is [the US] to give consent to a UK prosecution. If [the US] was willing, that would be a big plus point in terms of getting a UK prosecution.”

The hearing at the Royal Courts of Justice on Tuesday was to consider another aspect of McKinnon’s case — an application for a judicial review of home secretary Jacqui Smith’s decision to continue with McKinnon’s extradition, even after McKinnon was diagnosed with Asperger’s syndrome last summer. Asperger’s syndrome is a condition on the autistic spectrum.

McKinnon’s legal team requested from presiding judges Lord Justice Maurice Kay and Mr Justice Simon that the application for a judicial review be postponed until the director of public prosecutions had reached a decision. The judges denied the request.

“We didn’t get an adjournment,” McKinnon told ZDNet UK outside the courtroom. “Right now they’re going ahead with the application for a judicial review. And I’m going to the pub.”

Source

Hack Google's Native Client and get $8,192

Google is challenging hackers to rip apart their ActiveX alternative called Google Native Client. Native Client allows users to run native x86 code on the web — something that has been deemed as extremely dangerous, especially from untrusted sources.

Google says this challenge is to make Native Client more secure, but I think this may also be a great way to gain some trust points for technologies like this. Winners of the challenge are awarded cash prizes — the grand prize is $8,192USD.

There are five cash prizes: The first prize is $8,192, the second prize $4,096, the third prize is $2,048, the fourth prize is $1,024 and the fifth prize is $1,024. All amounts are in USD.

If they can get through this challenge without any serious problems being reported, that’s a huge win for Google, and some pretty impressive marketing material. That type of marketing ammo can be used to possibly help future pushes to get this type of technology pre-installed in browsers.

Source

Friday, March 20, 2009

Surface computer



Surface computing is the term for the use of a specialized computer GUI in which traditional GUI elements are replaced by intuitive, everyday objects. Instead of a keyboard and mouse, the user interacts directly with a touch-sensitive screen. It has been said that this more closely replicates the familiar hands-on experience of everyday object manipulation.

Recent minor innovations in the surface computing field are attributed to Apple, Inc and to Microsoft Corporation. Apple had demonstrated surface computing interfaces intended for professional use since 2006, with no expected product release date. Microsoft unveiled plans for the Microsoft Surface in May 2007.

A surface computer is a computer that interacts with the user through the surface of an ordinary object, rather than through a monitor and keyboard.

The category was created by Microsoft with Surface (codenamed Milan), the surface computer from Microsoft which was based entirely on a Multi-Touch interface and using a coffee-table like design, and was unveiled on 30 May 2007. Users can interact with the machine by touching or dragging their fingertips and objects such as paintbrushes across the screen, or by setting real-world items tagged with special bar-code labels on top of it.

The Surface is a horizontal display on a table-like form. Somewhat similar to the iPhone, the Surface has a screen that can incorporate multiple touches and thus uses them to navigate multimedia content. Unlike the iPhone, which uses fingers' electrical properties to detect touch, the Surface utilizes a system of infrared cameras to detect input. Uploading digital files only requires each object (e.g. a Bluetooth-enabled digital camera) to be placed on the Surface. People can physically move around the picture across the screen with their hands, or even shrink or enlarge them. The first units of the Surface will be information kiosks in the Harrah's family of casinos.

Besides the microsoft-created devices, other computer firms have also entered the surface computing market. These include Mitsubishi Electric with its DiamondTouch.

Also receiving units will be T-Mobile, for comparing several cell phones side-by-side, and Sheraton Hotels and Resorts, which will use Surface to service lobby customers in numerous ways.

The Surface has a 3GHz Pentium 4 processor, 2GB of memory, an off the shelf graphics card, a scratch-proof spill-proof surface, a DLP projector, and 5 infrared cameras as mentioned above. However, the expensive components required for the interface also give the Surface a price tag of nearly $10,000.


Microsoft Surface