Advertise

Sunday, December 8, 2013

Add Me on Facebook!

Add Me on Facebook!
I need more friends!!! Add me to get the latest news, articles and updates on the topics you're passionate about. Help me Reach my goal of 5000 friends!

Wednesday, December 4, 2013

Stealth Technology: History of Today’s Tactical Fighter

Stealth will be critical in the military battles of the future. Technological advancements in surface to air detection capabilities are leaping forward at an astronomical pace. However, advancements in design cannot keep up. Fighter jets rely upon stealth to avoid enemy radar detection. Aircraft without stealth capabilities simply cannot survive in the military battles of tomorrow.

Stealth Technology
Stealth technology was created to counter detection by radar. Radar sends out radio waves and measures the amount of rays reflected back. By doing this it can determine the size, distance and course of an object in the sky hit by the radio waves. Stealth aircraft are designed with surfaces that deflect radar waves to an angle adjacent from its trajectory. Simply speaking, once the waves hit the stealth aircraft, the radio waves are deflected outward rather than to the radar transmitter. This makes the stealth aircraft nearly invisible to radar.
F-117 Nighthawk
The world's first stealth aircraft was the F-117 Nighthawk. The unique design of the F-117 is actually as a result of the limitations of computers of the era. The F-117 relied heavily upon the flat surfaces to deflect enemy radar. Today, stealth aircraft are able to maintain a more aerodynamically efficient design while still maintaining advanced stealth capabilities. The F-117 was a breakthrough for its time. But it's multifaceted designed limited the aircraft aerodynamically.
Drag Versus Stealth
Today, aircraft do not have to sacrifice aerodynamics to maintain advanced stealth capabilities. The tactical fighter aircraft in production today has the lowest aerodynamic drag of any military aircraft ever made. The combined stealth capabilities and firepower of today's advanced tactical fighter make it far better adversary than any aircraft ever created.
New Generation Tactical Fighter
The F-15 was America's frontline tactical fighter for decades. However, it was not at all stealthy. Although it remains a proficient military capable aircraft, it is far outclassed by its successor, the F-22 Raptor. The F-117 is a stealthy aircraft but is limited aerodynamically and carries no air to air capability. The F-22 Raptor is not only stealthy, but carries both air to air as well as air to ground capabilities.
With the development of the F-22 Raptor, the F-15, as well as the F-117 became obsolete. The F-22 continues to be the frontline tactical air fighter of the United States as well as the most technologically advanced military fighter jet in service on the planet.

UAVs: The Future of the Air Force?

Predator UAV and Hellfire Missile
Information is the key to the conflicts of the future. Unmanned air vehicles or UAVs will provide a large part of that information while flying long-duration surveillance missions. But will be Air Force of the future have no pilots? Since the very first use of airplanes in military, planners have looked for ways to make aircraft more effective and more lethal. Once so secret their very existence was denied by the government, unmanned air combat vehicles or UAVs are now poised to take the preeminent role in 21st century air combat.
Future of UAVs
UAVs are certain to change air power in the 21st Century and it's starting to happen today. We are just beginning to see the first models on the field. Better unmanned air vehicles allow the military to do more with less and put more aircraft into the air with fewer pilots. The UAV is better served for missions that would be too risky for pilots. In the future, aircraft that have no pilots on-board will carry out the most dangerous combat missions. Today, UAVs are already taking over the role of long-duration surveillance. Losing a UAV in combat is less detrimental than losing a pilot.
Predator
One of the earliest UAVs was the Predator. Developed in the early 1990s, the prototype has been a long and enduring system that can really persist over the battlefield. In Afghanistan, Predators provided critical real-time intelligence and it was there that a Predator made an amazing transformation from surveillance to armed aerial attack craft. When the Predator destroyed a vehicle in an Al Qaeda convoy with a hellfire missile it crossed the line from unmanned air vehicle into an unmanned combat air vehicle.
Armed UAVs
Today, the new predator B can carry up to 10 hellfire missiles. Of course its primary mission is still what the military refers to as (ISR) or information surveillance and reconnaissance. The Predator serves as a satellite in that it can dwell an area. UAVs transmit important visual information to battlefield command via satellite or other data links. Once targets have been identified, and catalogued they can be disseminated through other weapons systems.
Recon Capability
The reconnaissance UAVs have multiple ways of conducting surveillance. On clear days, they use specially stabilized optical lenses that can zoom to high magnification. They use infrared at night, and under adverse conditions, they use synthetic aperture radar to peer through thick cloud cover, sandstorms or oilfield smoke. When the radar is reflected back, it can also be used to create a 3-D image of objects.
Although no word has been given whether UAVs will completely assume the role of air missions in the future; it seems that the question is increasingly weighing in on the cost of training pilots and the loss of human life over that of military hardware.

Monday, December 2, 2013

Life Discovered on Mars! Well, Not Exactly

We have only one way to study the surface of this tragically beautiful planet; advanced technology with a robotic arm and HD cameras for our eyes. In August of 2007, we launched the Phoenix mission to collect samples of both the Martian soil and atmosphere. Hopefully we can find water ice closer to the poles and analyze those samples with instruments on the deck of our spacecraft.
The lander we sent on the Phoenix mission will beam signals back from the Martian surface reporting the results of the remote soil and ice analyses. But before Phoenix even had a chance to make it off the launch pad a new wrinkle in the epic saga of Mars had revealed itself. Images sent back from the Viking orbiter circling the red planet show evidence of a very unexpected event. It appears that a liquid flow of some sort occurred within the last few years in a small gully at the edge of a deep Martian ravine.
In 2001 the orbiter took photos of the exact same spot with nothing of interest showing up in those shots. The new photos, on the other hand, showed a white residue in the gully. Residue seemingly left behind by a flow of liquid, possibly where water spurted from the ground and flowed for several hundred yards before transforming into vapor and vanishing. Scientists do not yet understand what might have caused such a flow. But many suspects that it's a result of an active core the planet must still contain.
Clearly, a volcanically active red planet indicates life. Not the life we were looking for, but the planet lives. It only needs inhabitants to call it home. We have found places on Mars where hydrothermal vents could be active. This is significant not just because we want liquid water. But because liquid water implies that this might be a new world waiting for us to come. Ironic to think of Mars as a living thing, but how can we not think of her this way now? And it is, of course, all about the search for life in when all is said and done.
The engine driving the astonishing scientific effort to explore the red planet is the burning desire of humankind to know if life exists elsewhere in the vast reaches of space. Mars seems to almost want to show us what we want to see. She displays to us her rich minerals. We want to see water so she displays plums of what could be water from her dry barren landscape. She has even shown us a face on her surface; a trick of lighting across her own scarred face to mirror our own.
Humans have since his dawning consciousness wondered why they are here and wonder what's up there and wonder if there's more. We seem to need to know the answer to this question to gain some kind of perspective. Finding life on Mars could also help us understand the origins of life here. Set aside your numbers and your data for a moment and peer up at that blood red spark in the sky with your own eyes. Have we not seen her face? Have we not seen her tears?
On our own planet, Mars could be a reflection of Earth and what we could bring about here. Scientists have even speculated that we could have perhaps arrived here on Earth on a celestial piece of Marsfloating in space. That is quite a leap even by scientific standards. To play devil's advocate, instead of asking, what wounded Mars so grievously? Perhaps we should ask, who did this to her? Perhaps in our search of life we should be mindful of what we may learn. As we continue to tax our own planet we may discover we humans are not life at all, but rather a universal contagion.
When a virus destroys its host does it not also kill itself? Does it not also seek a new host? As our numbers explode here like a virus, we may come to learn we are not a civilization at all, but a virus… and the death of worlds.

The Emerging Age of Nanotechnology

Graphene nanoparticle compared to Cobalt nanoparticle
The properties of graphene turned out to be so unique that scientists have not yet discovered the limitless potential uses. At only one atom thick this material has 20 or 30 superlatives to its name. It is the strongest material that has ever been measured. It is the most conductive material for electricity and heat ever discovered. It is the most impermeable material ever measured. In fact, this material is so different to anything we know it's hard to wrap our heads around quite how powerful it is.
Strength
Graphene is so strong that a 1 foot square meter of the material can sustain the weight of 1 kg. This would appear as if the 1 kg weight were suspended in mid air as the graphene is only one atom thick!The secret to the strength of graphene relates to the bonds between the carbon atoms. A model of the structure graphene indicates a tight formation of perfect hexagonal structures that vastly increases the overall structural strength.
Conductivity
Graphene is highly conducted electricity as a result of the bonds between its carbon atoms. The electrons within the carbon atoms behave as if they have no mass which allows them to move very quickly. The science behind the behavioral properties of these electrons ventures into the realm of quantum physics and is not completely understood by science today.
Practical Applications
Practical applications of graphene include replacing silicon in our electronics. Silicon has its limitations one of which is that we're quickly reaching a point where we cannot get silicon transistors any smaller or faster. Graphene does not have the same limitations so it is likely the next generation of electronics will consist of graphene-based transistors.
Undiscovered Potential
However, applying graphene to its full potential requires a new way of thinking about how we build our electronics. Thousands of researchers around the world are working with graphene to understand both its unique properties and potential applications. Hundreds of scientific papers on the properties of graphene are being written every week each proposing new ideas for its use in future technology. At the moment, baffled scientists admit the practical applications could be limitless in terms of what we know about technology. Infinitely smaller electronic components within our devices as well as infinitely faster computers rank among just a fraction of potential applications. Yet again, science fiction has become science fact and the age of nanotechnology is upon us.

Downsizing Technology

Graphene is Graphite on the atomic scale.
Perhaps taking somewhat of a backseat in headline-making technological advancements of our machines, are the materials we use to make them. The world of materials defines our technology from the mass-produced iron of the Industrial Revolution to the complex alloys of the jet age as well as the silica that underpins the information age. Now we may be on the verge of a new age, based on our ability to manipulate matter on the smallest scale.
Nanotechnology
Not all invention results from identifying a need and coming up with a solution. Sometimes scientific discoveries are so radical and unexpected they can take a while to realize their potential for practical applications. For years it has been widely assumed the technology required to advance us into nanotechnology was decades away. However, the biggest step towards nanotechnology has already quietly been developed earning its discovering scientists the Nobel Prize.
Rapidly Advancing Technology
Science and technology are advancing so rapidly that it's quite understandable that even we do not know where we empirically stand in the evolution of our technology. And such innovations often rely on the mavericks of invention who tend to look at the world in a very different way. While we dream of expected new advancements, these mavericks blindside us with the discoveries we could not have imagined in our wildest dreams.
Physicist Andre Geim
Physicist Andre Geim attributes most of his inventions to sheer luck, stating, "The more you try the more you get lucky". Andre is the man who made tomatoes, strawberries and even frogs levitate by focusing and manipulating strong magnetic fields. He also designed a sticky tape based upon the design of the feet of geckos. Andre Geim shared the Nobel Prize for discovering one of the strongest new materials in the world, Graphene.
Graphene
The journey that led Andre to the Nobel Prize began with pure scientific curiosity about the world of the very small. As a scientist he was always interested in what happened to the materials when they became thinner and thinner. Eventually you reach the point where the material is only as wide as its individual atoms and molecules. Graphite is composed of thin sheets of material tightly stacked together. Andre discovered that by simply using adhesive tape, graphite could be separated down to its atomic structure called Graphene. On this level materials behave in a completely different matter than they typically do at larger scales.
The practical applications of atomic materials radically change the game of technology because materials at the atomic level can literally defy the laws of known physics. As of yet, even the scientist who designed this material are hesitant to speculate its potential to alter the face of our technology. Until now, they had not even conceived the possibility of machines this small even in the realm of nanotechnology.

Are We Advancing Too Fast?

This speed at which ideas now move around the world is one of the defining characteristics of invention today. But another is the degree of specialization it takes to make these advancements in the first place. When you think about all the science that lies behind innovation today, it is so complex and so advanced it does not seem possible to stay on top of everything that's happening. And so to keep the pace of invention scientists have to work in a very different way from that of the lone scientist in the past.
Specialized Sciences
Certain sciences have become so specialized that is impossible to be an expert in all areas. Once upon a time, there was just one science journal today there are over 1000. Among the scientists of the world not many of them are aware of what the others are doing. Many have some basic idea and background information but there's no possible way they could all keep up with each other. Even we as writers researching new advances in technology are taken by surprise at new scientific advancements being made almost every day. Look at the Nobel Prize, when you read the citation for something that's been done in the scientific community it very often is totally alien to anyone not working in that field.
Alien Technology
Indeed, the simple categories we learned in school have now multiplied into a complex web of interconnected fields each with their own highly specialized subject areas. Brand new emerging fields of science include Quantum optics, Photonics, nanotechnology, genomics, quantum teleportation, quantum cryptography, Neuro-electro-dyametry, transcriptonics and bioelectrochemistry. Could this be a true definition of alien technology when our own intelligence outpaces us at a phenomenal rate?
Inevitable Obsolescence
The science of these fields was not even discovered yet when many of us were in school, yet they will be staples in the coursework of our emerging young scientists tomorrow. By the time those college students graduate, new emerging fields will have been discovered rendering many of their specialized degrees obsolete. What remains clear in our highly specialized and technological world is that scientists must collaborate if they ever hope to stay ahead of the next generation of advancements.
In a seemingly endless wellspring of information where no question seems far-fetched, perhaps what we should really be asking ourselves now is where all of this is coming from. And even more frightening, where will this blinding pace of rapid technologically-based intelligence ultimately take us?

Monday, October 7, 2013

What’s in Our Technology Future?

Apple front man Tim Cook, has admitted the possibility of the apple iwatch in our possible tech future as early as 2014. This device would be made of Corning Willow Glass,which is highly durable and flexible and is capable of running a digital display with Apple's current IOS. This sleek watch is rumored to have Wi-Fi connectivity in later models and may even replace your iphone. Cook also states that the iwatch would be a great response to the slightly awkward Google Glass. I could see myself in either. I would wear my iwatch and pretend I'm Dick Tracy, who's been captured and assimilated by the Borg with my Google Glass. But that's just me walking around everyday.

Next Generation Gaming Graphics
Even if you aren't a fan of games you have to see the new features being developed for the upcoming "Call of Duty - Ghosts" that's powered by a new innovative game engine. Using this new game engine technology, the mad scientists at Tesco have created a level of realism within the game that is near indiscernible from reality. As I said, this is not simply cool for gaming but for the future of all our high tech toys as this technology integrates into our laptops and iphones. This giant leap in screen resolution and graphics promises to draw us one step closer to that virtual reality we have been dreaming about since we got a glimpse of the Star Trek holodeck!

Virtual Organ Transplants
The Wake Forest Institute for Regenerative Medicine has created a working human kidney with the aid of a 3D printer. A 3D printer that uses cells rather than ink can actually build a working human kidney from scratch. Scientist admit they are years away from actually testing the working kidney in humans but have already successfully implanted an engineered bladder into a human patient. The same technology has already implanted regenerated tissue onto surface skin wounds and even has been used to replace degenerative bone tissue.

We focus on these three main advancements because they aren't simply our possible future, they are in developmental stages right now. We will see these innovations in our tech devices and on operating tables within the next year. What makes these three advances so important is their capability to greatly increase the power and efficiency of everything we are currently using. From these three innovations in technology further advancements will be possible in other areas of research and design that will shape our foreseeable future.

Sources:
Previously Posted on FullofKnowlege.com

Friday, October 4, 2013

Apple May Be Setting Samsung Up for a Very Painful Fall

It would not be out of reach for a company to fund research on a concept device with no real intent upon ever developing it. The iWatch has been rumored to be on the horizon for a couple of years. The issue with the iWatch concept, however, is the same as that with Google Glass, it isn't showing marketability.

Apple openly accused the Chinese technology giant of stealing research and design secrets from Apple to produce the Samsung Galaxy 5 iPhone. If they suspect Samsung of these shady practices it would be a crafty endeavor to front a fabled Apple iWatch research and development project specifically for the benefit of potential spies within their inner sanctum.

Apple is not violating any laws by admitting to the possibility of a future Apple iWatch when asked by about it, although Apple market shares bump slightly when CEO Tim Cook nodded that the concept was interesting and possible. And if Samsung happened to have gone ahead and pushed their own version of the iWatch to their peril it would certainly be unfortunate it they took a substantial loss when it doesn't sell.

The concept of the iWatch is the same as for Google Glass. It still requires refining in the designing. It is simply too bulky to fit comfortably on the arm and although the novelty of the iWatch is marketable the realistic viability of it is not.

Samsung announced the launch of their Smart Watch to arrive September 4th. No matter what behind the scenes subterfuge may be at play, its in Apple's favor to allow Samsung to test the waters with their own money before releasing a newer streamlined and more marketable version of its own later.

Sources/Resources
Previously Posted on FullofKnowlege.com

Can the Internet Threaten National Security?

In 2010, a man named Julian Assange became nearly as sought after by the United States government and Interpol as Osama Bin Ladin. His crime was leaking classified secret documents not to China or Russia, but to us. In recent news, another man named Edward Snowden is now hunted by the United States for leaking our government's intent to track, store and monitor every bit of digital information we send on the internet. Again, this man did not leak this to a communist government or terrorist organization. He leaked it to us, the American people. Why would it be so important to these individuals we be made aware of top secret government information? In this article we address the new internet age of online espionage and how secrets exposed globally can affect more change than by simply selling them to nations.

We first identify what the internet is at its essence. It is a global community where information can reach every part of the world in minutes. In the past, stealing secrets between nations served as a means of ensuring an equal footing on the global playing field. Governments each had spies infiltrating other governments seeking to learn the secrets of the other. When captured, the spies were held accountable. The cold war between Russia and the United States is a perfect example of the power of information in shaping governments and the balance of world power. We, however, remained largely oblivious to the shadowy conflict being waged under the cover of secrecy. Today that has changed and what we know as a global community can threaten national security.

Whether or not you consider those who leak government secrets to the public as heroes or guilty of treason the information they leak has potential to place others in harm's way. They may consider themselves as heroes by uncovering a questionable operation but in doing so reveals troop movements and locations. The information can reveal the identities of our undercover operatives within terrorist cells. The line is blurred as to whether we have a right to know this information but do we have the right to endanger those serving our country? Often these people who pass this information online are not considering the overall damage being caused by their actions. They are only concerned with achieving their motive.

So what is the benefit of your knowing secret information? When information leaked about the government storing and monitoring massive amounts of digital information from our cell phones and computers, the government had to address that. We begin to question if we want our government looking into our personal information and we want the matter investigated. Certainly those elected officials involved could find it very difficult to be reelected. The apparent intent of the information gathering is to locate terrorists hiding in waiting within our borders. The result was the public being entered into matters of national security. We learned later that checks and balances were in place to ensure no one's right to privacy was being violated. Again, whether we feel this exposed secret operation is good or evil is irrelevant. That tool in the nation's defense against terror within our borders has been compromised.

In the future, there will surely be more secret information leaked to us via the internet and we will decide for ourselves our opinions upon what we have learned. We should also consider the consequences. Nathaniel Mepham said, "Freedom is not free, everyday soldiers give their lives so we can live ours." Now that we are being interjected into matters of national security by those seeking to affect change in governments, we are made responsible for what we know. And good intent does not exempt spies from accountability.

Sources/Resources
Previously Posted on FullofKnowlege.com

The History of Spam

Spam not only fills up your Inbox but can infect your computer with viruses that can damage your system or even hijack your computer to be used as a host to infect more computers. We address internet viruses and some simple fixes that can greatly reduce the threat of online viruses and the spam that can cause them.

First I'll share a frightening scenario. You go to the doctor with complaints of fatigue and shortness of breath. After some tests you learn you are seriously at risk for congestive heart failure but with medication and some changes in your habits you can maintain your condition. You pick up your prescription and return home. You check your email and strangely find your spam box filled with emails corresponding to your medical condition. No, your doctor has not shared your private medical records with the entire world… well, not intentionally.

Botnet is a term that refers to the vast and intricate network of virus infiltrated computers that spammers use to send out massive amounts of information but also infect other computers to gain access to information. That's a mouthful and is enough to make your ears ring. But this is actually a very simplified definition of a very complicated system that can make your computer a node in a vast network of other computers to make you an unwitting accomplice to internet fraud. This article will focus on how you can protect your computer and yourself from spammers.

From nearly its declassified conception in the 1990s, the internet first discovered porn which soon resulted in the ability to submit credit card/bank account information over the internet. Porn became commercially widespread via the web in 1991. Not long after, the first resourceful net surfer realized there was profit to be made from the acquisition and theft of personal information from others and hacking was born. Soon after, security measure was installed into operating systems and spam was the hackers answer to internet security protocols.

Hackers are not internet gods and they cannot obtain your personal information unless you make it available to them. They must be able to access some or part of the data that you have manually provided. They utilize spam as a means to trick you into providing them with the information they need. Spam is the tool of their trade and even one in a million pieces of spam sent out resulting in either a newly acquired computer in their network, or allows them access to your personal information is profitable.

You can easily prevent this by never typing a password. Once you save a password to a notebook file, the simple act of copying and pasting the password will prevent a hidden keylogger on your system from recording your keystrokes and sending your password to the hacker. A registry cleaner or even your product enabled security software will search and destroy any potential viruses hidden on your computer to acquire your information. But the best method to protect your passwords is to simply never type them. Copy them once and forever copy/paste as needed from then on.

Your password should never be simple. It shouldn't be your child's name or your favorite vacation location. It should be a series of numbers and letters that you randomly type on your keyboard with your eyes closed. If you can not remember your password, you have a good password. Type it once to a notebook document then copy/paste it as needed. Search browser software can now auto save your passwords once you paste them in and can then apply them for you without you ever having to look up the password file. Notebook documents contain no add-ons and no external software, and thus are not as easily read by hacking software. I personally have never had any issues by copying/pasting my passwords from a notebook document.

Finally, your Internet browser has available applications that automatically block third party ads. Admittedly, most ads are not malicious or intrusive. But questionable sites will typically have questionable ads that will seek to infect your computer or, at least, spam an endless run of popup windows on your computer. Your browser can prevent these from interrupting your surfing experience. But remember to disable this useful little tool for the sites you love and want to earn their tiny bit from your visit!

Thursday, October 3, 2013

Isolation: A Real Concern for the Online Generation

If you are like me and your profession is the Internet, isolation can become an issue. It's an interesting psychological problem not easily understood or resolved. In fact, one need not be alone to become isolated. We are, in essence, more united now as a civilization than we ever have been in history. So how can we possibly be isolated?

Even if our profession is not online we do tend to spend a great deal of time online at home. We shut out our friends, family, and spouses drawing into ourselves more and more. And we absolutely never go anywhere without our smart phones. Some of us, me included, can even reply to a text message without even looking at the screen while simultaneously carrying on a conversation face to face with someone. Texting and walking can become as dangerous an activity as texting and driving, especially when the two intersect.

I am reminded of some amusing images I've seen while researching this article. A soldier standing at parade rest is addressed by his superior while texting behind his back. A woman topples into a mall fountain while texting and walking. A police officer directs traffic with one hand and checks his smart phone with the other. Even surrounded by people, we simply close ourselves off to the world around us with disastrous results.

Are we lost souls? Are we doomed to a fate of only connecting with others via cloud based relationships? No, we are not hopeless cases. With some simple guidelines we can cure ourselves of our own isolation and reconnect with those around us. But it is not easy and will feel unnatural at first.

Allow and embrace life's little interruptions. I have a cat that roams freely about my home. She will eventually make her way to me and require affection. Rather than shooing her away, I force myself from whatever I'm doing and show her attention. This is therapy for me as well, forcing me to return to the world around me. When friends and family visit, I leave my smart phone on vibrate in another room. If for any reason I do require my smart phone to receive a call related to a deadline or new contact, I let my visitors know that I'm expecting a call. My friends and family know this about me, and appreciate my efforts to remain centered in the here and now.

Many of us do, however, have deadlines and online obligations that require us to focus on what we are doing. I resolve this by reserving time to myself that I feel certain  will not be interrupted. I awaken early and sit in my window with a cup of hot tea or coffee during the early morning hours. And while the rest of the world sleeps, I tend to my assignments. By the time the first rays of the sun warm my face, I have my pending assignments completed.
With laptop and smart phone in tow, I drive to the coffee shop in town. I am warmly greeted there by friends and colleagues, the two are synonymous. Here we chat and exchange ideas and opinions over an early morning cup. Admittedly, this is often where I get my ideas and subject matter that I share with all of you.

There are moments of my life reserved for work and online activitiesn but there are definite moments specifically reserved for those directly in my life. As with all things, a balance must be maintained. This is vital as we delve ever deeper into this new era, so we don't loose ourselves in the thickening cloud around us.

Sources/Resources
Previously Posted on FullofKnowlege.com