Home Blog Page 258
nuclear weapons
Remember the Cold War? It is fine if you do not, the whole thing was over before even old, 30-something geezers like me hit our teens. For those of you too young to remember the O.J. Simpson chase, I'll go over the bullet points. After World War II America's enemy of the hour shifted from the German National Socialists to...
nanotechnology
We witness the uses of nanotechnology every time we get dressed, step outside, or drive to work. Nanotechnology is the process of applying extremely small things, sometimes as small as atoms or molecules, to improve different fields of science. Scientists have found many ways to improve the way we live, how we interact with our environment, the clothes we wear,...
kubo
The consumer electronics show in Las Vegas, Nevada debuts the latest in technology from ambitious start ups around the world. One such invention, called Kubo, is a small robot, really no larger than the size of  a soda can that can teach children as young as three years old the rudiments of code. Coding is the process by which commands are...
donald trump chia pet
It is often said that imitation is the highest form of flattery. What better a compliment can one have that having others openly trying to copy what one is doing. It is not a sure sign but a good sign that one is really onto something. Similar arguments can and have been made in terms of satire. Infamous Quebec cartoonist...
soft robotic sleeve
More than 5 million people have a heart attack annually in the US, and 41 million around the world. A heart attack is a frightening, confusing and extremely stressful experience. To make matters worse the recovery process can be just as tedious. Past treatments have differed as heart attacks fall under different categories. But they have ranged from open heart...
visual hacking
As cyber security measures against high-tech cyber attacks gain a strong footing in various organization sectors, the rudimentary attack methods such as visual hacking have been given a back seat. As a matter of fact, visual hacking has been rated as the fifth under looked low-tech threat. Visual hacking has been defined as the physical obtaining of classified information that...
streaming services
It seems the more technologically-driven our world becomes, we see cable companies and television networks raise their rates. We also find ourselves buying cable packages we know we won't be able to take full advantage of, but we still agree to pay for them because we need that one channel. What if those days are over? What if you could...
film piracy
Speaking about the music or movie industries without mentioning BitTorrenting and piracy seems practically impossible. The awkward truth: “Piracy is not so popular because people like to steal — it’s because it provides a better service model.” — Matt Mason. Today, our pirates have changed gold and diamonds by mp3, divx or mpeg files. But our pirates, like the old ones, have...
deflector shield
Now that caption sounds far-fetched. The works of fertile imagination which ought to be confined to the dungeons of mythical science. Such only happens in movies. A case in point is the Star Wars universe. Inspired by the aforesaid movie, students from the University of Leicester, have worked out a theory in an attempt to give credence to the star wars-esque...
compress images
JPEG is the best format to compress images. Well, not anymore! Google has now come up with a better format that is going to change digital images even more. But traditionally, this image system takes up much more space and is usually a relatively large file. The essence of this new format is to make images clearer while reducing its...

MOST POPULAR

HOT NEWS