live with the world: May 2016

Transparent, flexible supercapacitors pave the way for a multitude of applications

The standard appearance of today's electronic devices as solid, black objects could one day change completely as researchers make electronic components that are transparent and flexible. Working toward this goal, researchers in a new study have developed transparent, flexible supercapacitors made of carbon nanotube films. The high-performance devices could one day be used to store energy for everything from wearable electronics to photovoltaics.
The researchers, Kanninen et al., from institutions in Finland and Russia, have published a paper on the new supercapacitors in a recent issue of Nanotechnology.
In general, supercapacitors can store several times more charge in a given volume or mass than traditional capacitors, have faster charge and discharge rates, and are very stable. Over the past few years, researchers have begun working on making supercapacitors that are transparent and flexible due to their potential use in a wide variety of applications.
"Potential applications can be roughly divided into two categories: high-aesthetic-value products, such as activity bands and smart clothes, and inherently transparent end-uses, such as displays and windows," coauthor Tanja Kallio, an associate professor at Aalto University who is currently a visiting professor at the Skolkovo Institute of Science and Technology, told Phys.org. "The latter include, for example, such future applications as smart windows for automobiles and aerospace vehicles, self-powered rolled-up displays, self-powered wearable optoelectronics, and electronic skin."
The type of supercapacitor developed here called an electrochemical double-layer capacitor, is based on high-surface-area carbon. One prime candidate for this material is single-walled carbon nanotubes due to their combination of many appealing properties, including a large surface area, high strength, high elasticity, and the ability to withstand extremely high currents, which is essential for fast charging and discharging.
The problem so far, however, has been that the carbon nanotubes must be prepared as thin films in order to be used as electrodes in supercapacitors. Current techniques for preparing single-walled carbon nanotube thin films have drawbacks, often resulting in defected nanotubes, limited conductivity, and other performance limitations.
In the new study, the researchers demonstrated a new method to fabricate thin films made of single-walled carbon nanotubes using a one-step aerosol synthesis method. When incorporated into a supercapacitor, the thin films exhibit the highest transparency to date (92%), the highest mass-specific capacitance (178 F/g), and one of the highest area specific capacitances (552 µF/cm2) compared to other carbon-based, flexible, transparent supercapacitors. The films also have a high stability, as demonstrated by the fact that their capacitance does not degrade after 10,000 charging cycles.
With these advantages, the new device illustrates the continued improvement in the development of transparent, flexible supercapacitors. In the future, the researchers plan to further improve the energy density, flexibility, and durability, and also make the supercapacitors stretchable.
"One more important characteristic to be realized and urgently expected in future electronics is the stretchability of the conductive materials and assembled electronic components," said co-author Albert Nasibulin, a professor at the Skolkovo Institute of Science and Technology and an adjunct professor at Aalto University. "Together with Tanja, we are currently working on a new type of stretchable and transparent single-walled carbon nanotube supercapacitor. We are confident that one can create prototypes based on carbon nanotubes that might withstand 100% elongation with no performance degradation."
More information: Kanninen et al. "Transparent and flexible high-performance supercapacitors based on single-walled carbon nanotube films." Nanotechnology. DOI: 10.1088/0957-4484/27/23/235403



Seawater usable for production and consumption of hydrogen peroxide as a solar fuel

Scientists have used sunlight to turn seawater (H2O) into hydrogen peroxide (H2O2), which can then be used in fuel cells to generate electricity. It is the first photocatalytic method of H2O2 production that achieves a high enough efficiency so that the H2O2 can be used in a fuel cell.
The researchers, led by Shunichi Fukuzumi at Osaka University, have published a paper on the new method of the photocatalytic production of hydrogen peroxide in a recent issue of Nature Communications.
"The most earth-abundant resource, seawater, is utilized to produce a solar fuel that is H2O2," Fukuzumi told Phys.org.
The biggest advantage of using liquid H2O2 instead of gaseous hydrogen (H2), as most fuel cells today use, is that the liquid form is much easier to store at high densities. Typically, the H2 gas must be either highly compressed or in certain cases, cooled to its liquid state at cryogenic temperatures. In contrast, liquid H2O2 can be stored and transported at high densities much more easily and safely.
The problem is that that, until now, there has been no efficient photocatalytic method of producing liquid H2O2. (There are ways to produce H2O2 that doesn't use sunlight, but they require so much energy that they are not practical for use in a method whose goal is to produce energy.)
In the new study, the researchers developed a new photoelectrochemical cell, which is basically a solar cell that produces H2O2. When sunlight illuminates the photocatalyst, the photocatalyst absorbs photons and uses the energy to initiate chemical reactions (seawater oxidation and the reduction of O2) in a way that ultimately produces H2O2.
After illuminating the cell for 24 hours, the concentration of H2O2 in the seawater reached about 48 mM, which greatly exceeds previously reported values of about 2 mM in pure water. Investigating the reason for this big difference, the researchers found that the negatively charged chlorine in seawater is mainly responsible for enhancing the photocatalytic activity and yielding the higher concentration.
Overall, the system has a total solar-to-electricity efficiency of 0.28%. (The photocatalytic production of H2Ofrom seawater has an efficiency of 0.55%, and the fuel cell has an efficiency of 50%.)
Although the total efficiency compares favorably to that of some other solar-to-electricity sources, such as switchgrass (0.2%), it is still much lower than the efficiency of conventional solar cells. The researchers expect that the efficiency can be improved in the future by using better materials in the photoelectrochemical cell, and they also plan to find methods to reduce the cost of production.
"In the future, we plan to work on developing a method for the low-cost, large-scale production of H2O2 from seawater," Fukuzumi said. "This may replace the current high-cost production of H2O2 from H2 (from mainly natural gas) and O2."
More information: Kentaro Mase et al. "Seawater usable for production and consumption of hydrogen peroxide as a solar fuel." Nature Communications. DOI: 10.1038/ncomms11470 


New technique could make large, flexible solar panels more feasible

A new, high-pressure technique may allow the production of huge sheets of thin-film silicon semiconductors at low temperatures in simple reactors at a fraction of the size and cost of current technology. A paper describing the research by scientists at Penn State University appears May 13, 2016 in the journal Advanced Materials.

"We have developed a new, high-pressure, plasma-free approach to creating large-area, thin-film ," said John Badding, professor of chemistry, physics, and materials science and engineering at Penn State and the leader of the research team. "By putting the process under high pressure, our new technique could make it less expensive and easier to create the large, flexible semiconductors that are used in flat-panel monitors and solar cells and are the second most commercially important semiconductors."
Thin-film  semiconductors typically are made by the process of , in which silane—a  composed of silicon and hydrogen—undergoes a chemical reaction to deposit the silicon and hydrogen atoms in a thin layer to coat a surface. To create a functioning semiconductor, the chemical reaction that deposits the silicon onto the surface must happen at a low enough temperature so that the  are incorporated into the coating rather than being driven off like steam from boiling water. With current technology, this low temperature is achieved by creating plasma—a state of matter similar to a gas made up of ions and free electrons—in a large volume of gas at low pressure. Massive and expensive reactors so large that they are difficult to ship by air are needed to generate the plasma and to accommodate the large volume of gas required.
"With our new high-pressure chemistry technique, we can create low-temperature reactions in much smaller spaces and with a much smaller volume of gas," said Badding. "The reduced space necessary allows us, for the first time, to create semiconductors on multiple, stacked surfaces simultaneously, rather than on just a single surface. To maximize the surface area, rolled-up flexible surfaces can be used in a very simple and far more compact reactor. The area of the resulting rolled-up semiconducting material could, upon further development, approach or even exceed a square kilometer."


More information: Rongrui He et al. High Pressure Chemical Vapor Deposition of Hydrogenated Amorphous Silicon Films and Solar Cells, Advanced Materials (2016). DOI: 10.1002/adma.201600415 

Hundredfold optical fiber capacity increase sends thousands of HDTV videos per second

Nippon Telegraph and Telephone Corporation and collaborating labs have demonstrated the world's highest density optical fiber using a deployable optical fiber diameter of less than 250 µm. This optical fiber contains 19 optical paths (cores) that can support six kinds of optical signals (modes), and it provides 114 (= 6 modes × 19 cores) spatially multiplexed communication paths (channels) in one optical fiber.

A glass diameter of less than 250 µm makes it possible to ensure that optical fiber has sufficient reliability (i.e. bendable fiber that does not break). Accommodating 114 channels in one optical fiber enables us to transfer thousands of HDTV videos per second. The achievement indicates the reality of ultra-large capacity optical fiber that can handle a Peta- to Exa-bit.
We will continue to contribute to the realization of a future ultra large transmission capacity optical link.
This remarkable achievement was reported in March as a postdeadline paper at the Optical Fiber Communication Conference and Exposition (OFC 2016), the largest conference on optical communication in North America, which was held in Anaheim, California, USA.
This work was partially based on work commissioned by the National Institute of Information and Communications Technology (NICT).
Recent figures released by the Ministry of Internal Affairs and Communications indicate that the data transmission capacity in Japan exceeded 2.5 Tera-bits per second (Tera = 1012) in November 2013. This trend will require a data capacity of 100 Tera-bits per second by the late 2020s. It is also expected that the capacity crunch facing existing optical fiber, which has one optical path (core) supporting one kind of optical signal (mode), may be reached at the same time. This background means we must install additional optical fibers in the 2020s. However, the maximum number of optical fibers that can be stored in one is limited. We will also need to construct additional optical wiring infrastructure underground and in buildings, if there is insufficient space in the existing infrastructure.
Hundredfold optical fiber capacity increase sends thousands of HDTV videos per second
Figure 1 Design guideline for world’s highest core density optical fiber
To address these concerns, worldwide research has been under way on new optical fiber that uses space multiplexing technology. For example, multi-core optical fiber accommodates many cores in one optical fiber, and multi-mode optical fiber supports many modes in one core. However, it is difficult to obtain more than 50 communication paths (channels) using one core or mode multiplexing because of the limit to the glass diameter or the controllability of the refractive index profile. With this as the background, NTT, Fujikura and Hokkaido University (Laboratory of Information Communication Photonics) combined their expertise to realize an optical fiber with more than 100 channels while maintaining a deployable glass diameter by considering the best mix of core- and mode-multiplexing.
Details of Achievements
1.Design Guideline of Optical Fiber
NTT has investigated and experimentally confirmed that an optical fiber with a glass diameter of less than 250 µm can be used for over 20 years if an allowable bending radius of 15 - 30 mm is assumed considering actual deployment conditions in the terrestrial optical network. To realize an optical fiber with more than 100 channels, NTT and Hokkaido University numerically derived the optimum refractive index profile for guiding 3 or 6 kinds of optical signal (mode) in one core, and considered various core arrangements that can sufficiently suppress optical signal interference between neighboring cores. As a result, we clarified that a world record 114 channels can be spatially multiplexed when using a glass diameter of less than 250 µm by arranging hexagonally 19 cores that can support 6 modes (114 channels = 6 modes × 19 cores). This design resulted in a core density more than 60 times that in conventional optical fiber, which has one core and supports one mode.
Hundredfold optical fiber capacity increase sends thousands of HDTV videos per second
Figure 2 Optical property of fabricated optical fiber
2.Fabrication and Evaluation
Using the above design guideline as a basis, Fujikura fabricated an 8.75 km long optical fiber, and NTT evaluated its optical property. The optical attenuation at 1550 nm is less than 0.24 dB/km for all 114 channels, and to the best of our knowledge this is the lowest reported value for multi-core fiber using a 6-mode core. The fabricated optical fiber achieved superior uniformity where the variation in optical attenuation between channels was less than 0.03 dB/km. Moreover, we realized a transmission velocity difference between modes of less than 0.33 ns/km in the fabricated optical fiber, and this is one of the key parameters as regards optical transmission using multiple modes. This is also the lowest reported value for multi-core fiber using a 6-mode core, and reveals that the refractive index profiles of 19 cores were precisely controlled during optical fiber fabrication.
3.Applicability to large capacity transmission
To prove the applicability of the fabricated optical fiber to ultra-large capacity transmission, NTT evaluated the transmission quality using the latest QAM digital coherent transmission technology and an optical-fiber-type Fan-In/Fan-Out device. The Fan-In/Fan-Out device enabled 114 individual multiplexed/de-multiplexed optical signals to be launched into the fabricated optical fiber. We confirmed that we obtained a satisfactory transmission quality with a Q-value exceeding 5.7 dB, which corresponds to the lower transmission limit, for all 114 channels.
Hundredfold optical fiber capacity increase sends thousands of HDTV videos per second
Figure 3 QAM signal transmission performance
The present achievements indicate that an optical fiber using space multiplexing technology can be deployed while maintaining sufficient reliability for a few tens of years. A 100 times larger capacity can be realized by using mode and core multiplexing appropriately, and makes it possible to increase the transmission capacity greatly with a limited infrastructure.
We aim to launch a practical application of this  in the 2020s. To meet the increasing data communication demand in a sustainable way, we will continue to contribute to the realization of an optical infrastructure for the future.

bimoz - the world’s smartest e-bike drive

  • a mid-drive, fully integrated power system
  • up to 150 km range
  • less than 2 kg weight incl. battery
  • no friction or pedal resistance when turned off
  • integrated hub type design that is fully integrated into the housing of the bottom bracket spindle
  • bimoz blends harmoniously into the design of your bicycle
  • integrated intelligent sensors
  • patented technology
  • infinitely variable speed control
  • We have the lightest and easiest system worldwide to refit your conventional bicycle and make it into an e-bike
  • 250 W motor plus battery weights less than 2 kilogram!
  • made in Europe – high quality
  • direct drive with no gears, belts or clutches between the rider and the main sprocket = high performances with low-maintenance
  • compatible with all derailleur systems;
    allows most efficient use of the motor’s torque
  • extremely quiet, compact, robust and low-maintenance
  • no friction losses while driving without motor assistance
  • with bimoz you turn your favourite standard bicycle within 20 minutes into an e-bike with all the comfort of your personal bicycle and the support of a high-class e-bike
  • Drive support to mountains – the more you have to press down,
    the more help you get from the bimoz.
  • No "pushing" or "pulling" thanks to the permanent magnet system,
    no audible noise of the drive.
  • Riding without drive is without any change to the riding characteristics.
    You can use your bicycle as if it were your normal bicycle.
  • Through our design principle "less is more", we have designed the bimoz to below 2 kilograms (250 Watt, standard battery).
  • Training function:
    The bimoz is an ideal exercise machine. Using the "bimoz app", "Mountains" can be simulated during an exercise in the lowlands.
  • Cardio training is also possible:
    You enter your pulse rate, and the bimoz supports you, if it becomes too much, or slows you down if the course is too easy.
  • Using the bimoz app, you can share beautiful routes with friends.
Switching to electric mobility is not only a domain of cars. Precisely in urban areas switching to bicycles is desirable. But who wants to come already sweaty to the office? This makes the bimoz just right. The bimoz allows a choice between bicycle riding and electric drive. The real bimoz feeling is like "Downhill with a tail wind". In just a few minutes, almost everyone can turn their bicycle into a Pedelec. 

No parking problems, no traffic jams – this is how the world looks with bimoz. bimoz is a quality product and behaves like a Swiss watch: It precisely and sensitively supports the bimoz rifer. The battery is removable and can be recharged so comfortably at home or in the workplace.

World's first personal air conditioner

Start enjoying eco-friendly and energy efficient evaporative climate technology right now with Evapolar! Create your personal microclimate and enjoy ultimate comfort exactly when you need it and where you need it!
Evapolar works on the power of water evaporation - the simplest and most efficient cooling technology since ancient times. Evaporative coolers already exist but you may have never heard of them - they are all very bulky and if your hot season is short they are not presented in your market at all. But Evapolar is not just another evaporative cooler. It received a number of upgrades that make it truly unique. And the main one is that we managed to make it both powerful and compact so you could put it on your table.
  • Evapolar is a desktop personal air conditioner that not only chills, but also humidifies and purifies air.
  • Your personal climate created by Evapolar is healthy for your skin and hair.  
  • Thanks to its portability, Evapolar makes you feel comfortable exactly when you need it and where you need it.
  • In order to make Evapolar both small and powerful we had to develop a special evaporative nanomaterial that was previously a part of Russian military tech.
  • Evapolar emulates a soft natural chilling process instead of just producing a cold air thread like the other air conditioners (that often leads to catching a cold).
  • Evapolar is absolutely eco-friendly and 12 times more energy efficient than traditional split systems.
  • It is very easy to use and ready to work right out of the box.
  • Spreads coolness smoothly the same way air is cooled in nature (instead of producing a strong cold air thread like the other air conditioners are doing, that often leads to one catching a cold).
  • Humidifies the air which is healthy for your hair and skin.
  • Purifies the air making it easier for you to breathe thereby increasing your productivity.
for more info click here
Always a show-stopping concept: something lightweight that turns objects we have in the real world into virtual touchscreens. A Shanghai-based company wants to roll with that concept, in the form of its special mini-projector, the Lazertouch.

Use the surface of your table at home, for example, to play an interactive game with your child; use the wall of your next meeting place to show business partners who far your project has come.
The company has turned to an Indiegogo campaign to raise funds. This is a mini projector which can work as a tablet or interactive whiteboard.
The device has an Android OS. Shanghai Easi Computer Technology Co (Easitech) is the company offering this; it was established in 2002; its specialty is image analysis and lasertouch technologies.
Lazertouch projects an approximately 15-inch screen on a desk or table; you operate on what you see with your finger or stylus. As for a wall display, it can turn a wall into a 150-inch finger-activated touchscreen for presentations.
At home you can use it for movies and games. According to the company release, it is safe for children’s' and adult’s' eyesight.
How it works: The projector emits an invisible laser beam parallel to the projection screen. When a finger or stylus touches the , the sensor detects and interprets the touch to add your comments, double click on an icon, stop or start a movie, or anything else you do with a touchscreen device.
Features include downloadable apps, speakers, 32GB of storage, Bluetooth, Wi-Fi, a 13,600mAh rechargeable battery, and ports for HDMI, USB, headphones and Micro SD.
Start a meeting with it or use it for home entertainment-supporting 200-inch HD movies and immersive VR gaming, and projecting musical instruments, such as a drum or piano
The price range varies depending on the package but one such offer was at the time of this writing listed as a super earlybird price of $475 with estimated delivery in July.
The projector comes with an IR e-pen stylus.
The company is looking to raise $30,000 with a month to go and they raised $7382 at the
time of this writing.
A release said, "Lazertouch is the only mini projector that allows you to use a finger to quickly perform operations on the screen – no need to worry about a lost stylus. Users can also write smoothly with the included e-pen stylus, helping you deliver a powerful whiteboard interactive presentation with notes and comments. It even includes a pointer for clarification and emphasis – the essential portable device for teachers, speakers, and business executives. When conducting a group meeting, Lazertouch projects an approximately 15-inch screen on a desk or table that can be operated by finger or stylus as you would a tablet. Its versatile operation lets you transition to full screen on an up to 150-inch wall when more people come into the meeting – and it even works with interactive advertising boards."

Researchers unveil dual screen smartwatch

A Dartmouth researcher and his collaborators have unveiled a prototype of a smartwatch with dual touchscreens called Doppio.

The researchers presented their findings Wednesday at the CHI Conference on Human Factors in Computing Systems.
Doppio is a reconfigurable smartwatch with two touch-sensitive display faces, one of which detaches from the wrist-bound screen and can be stuck above or to the side. "The orientation of the top relative to the base and how the top is attached to the base create a very large interaction space," says Xing-Dong Yang, an assistant professor of computer science at Dartmouth.
In their presentation, the researchers discussed possible configurations, transitions and manipulations in this space. Using a passive prototype, they conducted an exploratory study to probe how people might use this style of smartwatch interaction. And with an instrumented prototype, they conducted a controlled experiment to evaluate the transition times between configurations and subjective preferences. They used the combined results of these two studies to generate a set of characteristics and design considerations for applying this interaction space to smartwatch applications.
"Our proof-of-concept hardware prototype demonstrates how Doppio interactions can be used for notifications, private viewing, task switching, temporary information access, application launching, application modes, input and sharing the top," Yang says.

'water-in-salt' lithium ion battery technology

A team of researchers at the University of Maryland (UMD), U.S. Army Research Laboratory (ARL), and colleagues have developed a battery that is at once safer, cheaper, more environmentally friendly, and more powerful—by adding a pinch of salt.

Advancing UMD research on groundbreaking "water-in-salt" lithium ion battery technology, the researchers found that adding a second salt to the water-based (aqueous) batteries increased their energy capacity, but without the fire risk, poisonous chemicals, and environmental hazards of lithium ion batteries that dominate the portable electronics market.
"Our purpose was to invent an aqueous lithium ion battery that is absolutely safe, green, and cost-efficient, while delivering energy density comparable to commercial lithium ion batteries," said Liumin Suo, postdoctoral research associate in UMD's Department of Chemical and Biomolecular Engineering. "We believe our batteries will have very wide applications including electric energy storage, airspace devices, and portable electric devices."
A peer-reviewed paper based on the study was published recently in the journal Angewandte Chemie as a Very Important paper (VIP).
The team of researchers—led by Chunsheng Wang, professor in UMD's Department of Chemical & Biomolecular Engineering, and Kang Xu, senior research chemist and fellow at ARL—said their work demonstrates a major advance in water-based batteries by further increasing the voltage, or power, of an aqueous battery.
"Our invention has the potential to transform the energy industry by replacing flammable, toxic lithium ion batteries with our safe, green water-in-salt battery," said Wang. "This technology may increase the acceptance and improve the utility of battery-powered electric vehicles, and enable large-scale energy storage of intermittent energy generators like solar and wind."
The researchers said their technology holds great promise, particularly in applications that involve large energies at kilowatt or megawatt levels and in applications where battery safety and toxicity are primary concerns, including non-flammable batteries for airplanes, naval vessels, or spaceships.
"All this leads to a safe lithium ion technology that is free of any fire and explosion hazard, benefiting both the soldier and the civilian," said Arthur Cresce, an author on the paper and research chemist with ARL. "For instance, energy storage units of the electrical microgrids, which would manage energy produced and harvested in camp, could rely on a WiSE-based battery bank to store and release electricity without the safety and environmental concerns, increasing the camp's self-reliant energy capability."
"The water-in-salt electrolytes developed by this group have unexpectedly opened the possibility of high-voltage aqueous electrochemical systems, impervious to water splitting reactions. The new water-in-bisalt electrolytes, incorporating two or more lithium salts, may soon lead to safer, cheaper, and longer lasting water-based lithium-ion batteries," said Massachusetts Institute of Technology (MIT) Professor Martin Bazant, a leading battery researcher who was not involved in the study.
At UMD's 2016 Celebration of Innovation and Partnerships on May 9, Wang, Xu, Suo, and the rest of their research team won Invention of the Year: Physical Sciences for their groundbreaking "water-in-salt" aqueous lithium ion battery technology.
More information: Liumin Suo et al. Advanced High-Voltage Aqueous Lithium-Ion Battery Enabled by "Water-in-Bisalt" Electrolyte, Angewandte Chemie International Edition (2016). DOI: 10.1002/anie.201602397 


Hyperloop super-fast rail to hit milestone

Elon Musk's vision of a Hyperloop transport system that carries passengers in pressurized tubes at near-supersonic speeds is on track to hit a milestone on Tuesday.
Musk outlined his futuristic idea in a paper released in 2013, challenging innovators to bring the dream to life.
Hyperloop Technologies, one of the startups that picked up the gauntlet thrown by Musk, is hosting a "sneak preview of the future of transportation technology" during a two-day event billed as involving a demonstration at a test site outside Las Vegas.
A series of tweets fired from the Twitter account @HyperloopTech teased "big announcements you don't want to miss" and included a video snippet of construction in the desert.
A caption in the video clip heralded a "milestone event" that would be live-tweeted from Las Vegas beginning Tuesday evening there.
Kitty Hawk moment
Late last year, Hyperloop chief executive Rob Lloyd said in an online post that the team was working toward a "Kitty Hawk" moment in 2016.
The post came with word of an agreement to use an industrial park in the city of North Las Vegas to conduct a Propulsion Open Air Test of the blazingly-fast rail system.
Lloyd described it at the time as a very important step on the way to realizing the full potential of Hyperloop Tech.


Our 'Kitty Hawk' moment refers to our first full system, full scale, full speed test," Lloyd said.
"This will be over two miles of tube with a controlled environment and inside that tube we will levitate a pod and accelerate it to over 700 miles (1,125 kilometers) per hour."
He indicated in the post that a full-scale test might not take place until late this year.
Hyperloop did not reveal what components of the system would be shown in a demonstration slated to take place Wednesday at the test site.
The Hyperloop project went live in 2013 on crowdfunding platform JumpStart Fund, which marries crowdsourcing expertise with crowdfunding.
That year, Musk unveiled a design for a super-fast transport system dubbed "Hyperloop" that could carry passengers in low-pressure tubes at near-supersonic speeds.
Musk has said he has no plans to build the system but offered the "open source design" to allow others to pursue a venture. He's called the system a cross between a "Concorde, a rail gun and an air hockey table."
Jon Favreau, director of "Iron Man," has referred to Musk as a modern-day "Renaissance man."
In an article for Time, Favreau said he and actor Robert Downey Jr. modeled the main character in the movie—"genius billionaire Tony Stark"—after the Silicon Valley star.
Musk told Time that his goal was to be "involved in things that are going to make a significant difference to the future of humanity."
South Africa-born Musk has become one of America's best-known innovators, having launched a payments company, electric carmaker Tesla Motors, SpaceX and SolarCity, which makes solar panels for homes and businesses.
He also operates his own foundation focusing on education, clean energy and children's health.
Another approach
Meanwhile, another startup that has picked up the Hyperloop gauntlet announced that its design is incorporating passive magnetic levitation originally conceived by a team at Lawrence Livermore National Laboratory.
"Utilizing a passive levitation system will eliminate the need for power stations along the Hyperloop track, which makes this system the most suitable for the application and will keep construction costs low," Hyperloop Transportation Technologies chief operating officer Bibop Gresta said in a statement.
"From a safety aspect, the system has huge advantages, levitation occurs purely through movement, therefore if any type of power failure occurs, Hyperloop pods would continue to levitate and only after reaching minimal speeds touch the ground."
After Musk published a white paper describing a futuristic mode of super high-speed rail transit, Hyperloop Transportation "rose to the challenge," it said.

What Does E=mc^2 Mean?

E=mc^2 is a version of Einstein's famous relativity equation. Specifically, it means that energy is equal to mass multiplied by the speed of light squared. While seemingly simple, this equation has many profound implications, chief among them being that matter and energy are actually the same stuff. Pure energy in the form of motion can be converted into matter, through the creation of a particle, which has mass. However, as the equation implies, it takes a huge amount of energy to create a tiny bit of mass. - 

Holoflex—World's first holographic flexible smartphone

Researchers at the Human Media Lab at Queen's University have developed the world's first holographic flexible smartphone. The device, dubbed HoloFlex, is capable of rendering 3D images with motion parallax and stereoscopy to multiple simultaneous users without head tracking or glasses.

"HoloFlex offers a completely new way of interacting with your smartphone. It allows for glasses-free interactions with 3D video and images in a way that does not encumber the user." says Dr. Vertegaal.
HoloFlex features a 1920x1080 full high-definition Flexible Organic Light Emitting Diode (FOLED) touchscreen display. Images are rendered into 12-pixel wide circular blocks rendering the full view of the 3D object from a particular viewpoint. These pixel blocks project through a 3D printed flexible microlens array consisting of over 16,000 fisheye lenses. The resulting 160 x 104 resolution image allows  to inspect a 3D object from any angle simply by rotating the phone.
Building on the success of the ReFlex flexible smartphone, HoloFlex is also equipped with a bend sensor, which allows for the user to bend the phone as a means of moving objects along the z-axis of the display. HoloFlex is powered by a 1.5 GHz Qualcomm Snapdragon 810 processor and 2 GB of memory. The board runs Android 5.1 and includes an Adreno 430 GPU supporting OpenGL 3.1.
Dr. Vertegaal envisions a number of applications for the new functionality of the HoloFlex technology. A first application is the use of bend gestures for Z-Input to facilitate the editing of 3D models, for example, when 3D printing. Using the touchscreen, a user can swipe to manipulate objects in the x and y axes, while squeezing the display to move objects along the z-axis. Due to the wide view angle, multiple users can examine a 3D model simultaneously from different points of view.
"By employing a depth camera, users can also perform holographic video conferences with one another", says Dr. Vertegaal. "When bending the display users literally pop out of the screen and can even look around each other, with their faces rendered correctly from any angle to any onlooker".
HoloFlex also can be used for holographic gaming. In a game such as Angry Birds, for example, users would be able to bend the side of the display to pull the elastic rubber band that propels the bird. When the bird flies across the screen, the holographic display makes the bird literally pop out of the screen in the third dimension.
Queen's researchers will unveil HoloFlex in San Jose, California at the top conference in Human-Computer Interaction, ACM CHI 2016, on Monday May 9th.
More information: Gotsch, D., Zhang, X., Burstyn, J. and Vertegaal, R. HoloFlex: A Flexible Holographic Smartphone with Bend Input. In  Extended Abstracts of ACM CHI'16 Conference on Human Factors in Computing Systems. ACM Press, 2016. 
watch a clear video description at youtube

WHAT IS VIRUS?

Contrary to popular belief, hacker’s own machines are often more vulnerable to attacks than the average user. This is especially true of those who are new to the world of hacking because of their more frequent access to remote machines, dodgy forums, open administrative privileges on their own machines and inexperience in covering their tracks etc. Further, those who are experienced often take advantage of the ones who are in the learning stage, trying to get into this field. In this dog-eat-dog world, any kind of safety is an illusion unless proven otherwise. Again, for the newbie hacker, it is of vital importance to learn how to protect themselves to avoid being consumed by their own curiosity.
Viruses are perhaps the oldest form of malicious software. They’ve been around for a long time and are still evolving and causing havoc all over the world. At first sight, they seem to be innocent looking executable files, but if opened they can turn your world upside down in a second. Reliance on antivirus software is fine as a first line of defense, but you need a basic arsenal of skills for securing the executables on your system and coping with viruses on your own. Here we discuss proactive methods you can use to defend yourself against malicious executable code in files, resources, component libraries, scripts and macros, as well as how to avoid a handful of other potential vulnerabilities.
Depending on how destructive their payload, computer viruses can result in a significant loss of data, time, and money. In the best scenario, you may just lose the time it takes to disinfect your computer. At worst, a mission-critical server may be reduced to little more than an expensive door-stop. Unfortunately, antivirus software isn’t perfect, and there’s always some lag between the emergence of a new electronic predator and the availability of virus definitions to protect against it. Moreover, many programmers of today’s more diverse and sophisticated computer viruses are taking the preemptive step of disabling or even removing antivirus software as part of their operation.
I’m not suggesting that you shouldn’t rely on your antivirus programs for day-to-day virus protection, especially since antivirus programs are very good at keeping you safe from known threats. However, if you’ve never had to fight a virus without your antivirus software, then it’s only a matter of time before you will. The main reason for this is new viruses. For an antivirus to be able to guard against new viruses, it must first be reported, the virus scanning code must be modified to include this new virus, and finally the virus database copy on the client side must be updated.
Because virus protection changes every day, those annoying notifications that your antivirus probably gives routinely are there to protect you. You must’ve noticed in the UPDATE menu of any antivirus an option to “Update Virus Database” or something like that. This is evidence of the ongoing war against viruses.
In general, how do viruses work? Well, first, the programmer writes the executable code required to carry out the virus’s activation process and then whatever nasty things it’s meant to do. What does the author want the virus to accomplish? Should it reformat your hard drive? Delete JPG files? Mail copies of itself to your friends and coworkers? Making any of this happen requires “executable” code of some kind. Second, in order for this code to execute, the virus needs to be activated or opened. The usual way a virus’s executable code is run is the direct method: some unwary user receives an e-mail attachment called “Click-Here.exe” or something equally enticing. This runs the program and the virus is unleashed.
As easily avoided as this result seems to be, it still works far more often than it should. Virus writers have discovered a number of other, less obvious techniques for getting a virus to take over your computer. Below we take a look at some of these techniques, beginning with the question of what constitutes executable code, then we’ll examine several sneaky activation methods. These activation methods are particularly important, as this is where you’ll understand how to completely unhook viruses from your system in order to regain control of it following an infection.
What Constitutes Executable Code?
Of course, you know that .exe files are executable, as are other similar file types such as .cmd and .com etc. There are many other file types that may contain executable code, and any executable code can be unsafe. In general, executable code falls into three broad categories: standalone programs, code included within resources or libraries, and script or macro code executed by an interpreter of some kind. In a broad sense, a standalone program is pretty much any file type that relies on the operating system for it to execute. How do you know which ones these are? The answer lies in the Windows® registry. To battle against viruses on their own turf, you’ll have to be very comfortable delving into the registry. So let’s take a look at how executable programs are invoked (A little technical, read slowly).
Launch the Registry Editor by opening “Run” and type “regedit”, and expand the HKEY_CLASSES_ROOT (HKCR) node.It’s the operating system’s repository for information on file associations and commands. Under HKCR, you’ll find nodes representing all the file type extensions registered on your computer. Navigate down the tree until you locate the key named .exe. Select this node and observe that its default value (shown in the right-hand pane) is exefile. This is a pointer to another node under HKCR (the exefile key). Scroll down and find the exefile folder. The exefile key contains a shell subkey. This is where a file type’s available actions are defined. In OS terminology, these actions are known as verbs. For example, a Microsoft® Word document might have a “print” verb defined, which allows you to right-click the file in Windows and choose Print from the context menu. Expand the shell subkey for the exefile node to view the available verbs for EXE files. You’ll probably see two or three different subkeys, depending on your system. The one to be concerned with is “open.”(HCKR ->exefile ->shell ->open) Expand this node and select its command subkey. Each verb has its own subkey, and each of those keys in turn has its own command subkey. The default value in this subkey dictates exactly what happens when that verb is executed.
Double-clicking the file icon in Explorer has the same effect—it executes the default verb’s command (open for EXE files). As you can see, for EXE files, the open command verb has a value of: %1 %* This is used in MS-DOS® batch file language. The basic idea is that the path and file name of the EXE file you activated are substituted for the “%1” parameter, while any switches or command-line parameters that go along with it are passed through the “%*” parameter. So it would stand to reason that any other file types whose open verb evaluates to some flavor of “%1” would tend to pose a risk. There are a number of these, and they’re all potentially dangerous. Considering that the virus writer knows that most people won’t double-click a file with a .exe extension or a .bat file, there are several other options including : .cmd .com, .pif, .vbs – All of these file types have a default open verb of %1. A virus writer could simply change the .exe extension of his virus executable to ,say .com, and s/he probably just increased the chances that the unsuspecting masses will run it. Particularly dangerous is (was, actually) the humble screen saver file type (.scr extension). Close to the start of the 21st century, .scr viruses were literally everywhere. They were widely believed to be power-saving, which is so not true (Stand-by mode is much better). People thought it couldn’t hurt, right? so what’s the harm. So Naive.. Again, extension hardly matters, everything a .exe virus can do, a .scr one can do equally well. The days of .scr might be gone, but viruses are probably here to stay, Whatever the type, extension, purpose and payload – The core concepts are always the same. So, let’s take a deeper look at the working of .scr viruses. The key to the future lies in the past.
Between the shadows.. In your Registry Editor, compare the open verb’s command default value for EXE and SCR files, respectively. As you will notice, they’re pretty much identical— “%1” %* for EXEs and “%1″/s for Screen Saver files. Screen savers are, as it turns out, standalone executables. The only difference between these two default verbs is a /S switch for the SCR file type. The intended purpose of the screen saver’s “open” verb is to allow for testing a screen saver, and the screen saver executable interprets the /S switch accordingly. There’s nothing to stop a virus writer from giving their application a .scr extension and then simply ignoring the /S switch passed to it when the user invokes the program. Exploiting the popularity of screen savers was even easier because the caption of the screen saver’s open verb is shown as “Test” in the right-click menu. A user thinks he’s just testing a screen saver, but what he’s actually doing is activating a virus. A particularly clever virus might even display an actual screen saver, preoccupying you with pretty flowers while it destroys files on your hard drive in the background. This caption is stored in the default value for the open key itself. Meaning, just like you can simply find and change your “Recycle Bin”s name to say “Dumpster” or “TrashCan”, you can also change the “Test” option to anything you like. On an unrelated note, you may also change the “Open” option for a word document to maybe “Do Belly Dance” or anything you like. Of course, this only changes the string and not what it does.(Try using the CTRL + F, find function to poke around and feel the power of regedit. Be warned, don’t change anything that you don’t know about. Changing text strings like “My Computer” is harmless, but changing some core functions code may wreck your computer before you can undo it.
Libraries Can Be Dangerous Executable code can live inside resources or component libraries of many different varieties. These may not seem like obvious candidates for viruses, but they can certainly be exploited in that way. These file types include Dynamic Link Libraries (DLL), Control Panel Applets (CPL), various Type Libraries (TLB, OLB, and so on). This code isn’t directly executable with a %1 command verb like .exe, but this doesn’t mean that the code can’t be run. Just about any function exported from a DLL can be invoked using a helper application called RUNDLL32.exe.
A virus could employ two possible attacks. One would be to replace an existing DLL with a compromised version, in which a particular function is replaced by one of the same name but with altered functionality. Then, whenever the system invokes this function, instead of having the desired result, the virus is activated instead. The second approach is simply to write a DLL from scratch and invoke its functions using RUNDLL32.EXE when needed. This isn’t quite as straightforward as invoking the code in an EXE file, but a DLL, OCX, TLB or other library file is more likely to be accepted by an unsuspecting user or to be overlooked by an antivirus program, so it may well be worth the greater effort on the virus author’s part.
Scripts and Macros—Increased Flexibility Brings Increased Risk Script code requires a script engine to interpret and run, but it can still be exploited. Scripts come in several forms, they may be used to perform a repetitive task, modify documents, pretty much everything that a .exe file can do. Microsoft has done a lot to tighten the security of these macros and scripts, but it’s still easy for a macro virus to do a lot of damage. A popular script category is Windows Script Host (WSH) files. These files, usually with .wsf, .js, or .vbs extensions, carry a default file association which causes them to be executed, no questions asked, when users double-click them. As you might imagine, this can be disastrous.
Web applications may also carry dangerous scripts. Client-side scripts, for example are fairly limited in their access to the host system for security reasons, but there’s a little-known file type, the HTML Application (with an HTA extension), which works like a client-side Web application without the same security restrictions. Its purpose is to allow developers to use their Web development skills to build rich applications using the Web browser metaphor. But again, the unsuspecting user can unleash all sorts of chaos by downloading and executing such a file without first examining its contents. All of these scripts and macros can be readily examined before they’re executed, but clearly an average user won’t bother reading some weird code.
Virus Activation Methods The most common way for a virus to be activated is for a user to directly execute, say an e-mail attachment. Virus writers do just about anything to make you open the attachment using this action, but most developers are savvy enough not to just run an unknown executable. Of course, just about all of us have done it at one time or another—particularly now that viruses can access address books and can assemble a credible-looking e-mail message, ostensibly from someone you know and trust. Be that as it may, as users have become more aware, virus creators have gotten more devious, and there is now a host of new methods for activating a virus on a computer that don’t require any code to be explicitly executed (E-mail attachment viruses are a rare sight nowadays, since most email services themselves check emails for malicious files).
Registration Files Files with a REG extension, are system registration files that hold information to be integrated into the system registry. The problem with them is that they carry a default verb of “open”. This means that if any registration file is double-clicked, it immediately dumps its contents directly into the system registry, without any confirmation required (depending on your OS). Since it has access to the registry, it is free to modify anything it pleases. It may delete vital keys required for the system to startup or even modify existing ones to make further file types vulnerable. Also, it may create a new entry for a previously unknown extension. A general antivirus may not recognize and hence ignore a file extension of for example, .bobo. But in the registry there could be an entry to make the file’s default action to “Open” or “Run” – giving it all the powers of a .exe file. This could be potentially devastating. Luckily, most antivirus softwares nowadays are adopting the “sandboxing” technique to run untested files. Basically the antivirus gives the file a test run in a secure and sealed environment (sandbox) and checks if it tries to get out by for example, trying to access something that it’s not supposed to or changing system settings and variables without asking the users explicitly. Inside the sandbox, it is denied anything remotely suspicious and the antivirus raises a big red flag and moves the file to the quarantine section (virus vault) or maybe even delete it straightaway.
Path Vulnerabilities Another hazard is something called the PATH environment variable. Anyone who uses a computer is bound to have used a “shortcut” file at least once. Whether it’s the “Google Chrome” icon on your desktop or maybe “WinZip” in your taskbar these shortcut files are simply links to the actual files stored in the folder in which they were installed. It’s clearly a little tedious to open “My Computer” -> C: Drive -> Program Files -> Mozilla .. To open “Mozilla Firefox” every time. Hence, we have these shortcut files which simply store the “Path” to the actual application. These files don’t exactly use the Path environment variable, but the concept is exactly the same.
The computer has certain files (example: explorer.exe) that it may routinely need to open (example: at startup). So, in the Registry it has simply stored the name of the file it needs to open, and it’s path (in a path variable). Whenever the OS needs to open a particular system file it simply looks it up in the registry, follows the path in the memory and opens it. What does this has to do with viruses? With everything from phones to cars to houses getting smarter every moment, our computer viruses are not behind. It’s just a little too obvious and literally “on the nose” when a user clicks a file and his computer goes berserk. Once infected, our victim, although compromised is now a little wiser for he knows exactly where it went wrong. If the victim downloaded something from a website that caused damage to his system, s/he may report the website to the police. Clearly jail time is not so appealing to anyone, let alone virus programmers.
This brings us back to path vulnerabilities. Get this. The attacker needs to infect a system without making it too obvious. To do so, s/he needs a time gap between the actual infection and the attack, so that it hits the victim out of the blue. We have two ways to do this by exploiting the path variable. Average users don’t really bother to sniff around system files like in the “Windows” folder (you may find this in your C: drive) and this much understandable carelessness can be exploited. The attacker can simply take two systems, one with Windows 7 and the other with XP and search for the location of (example) “winlogon.exe” – A file that is used by the OS to maintain a user session. (You may find this running in the task manager). Now in the virus file, the attacker can simply write up code to create two copies of virus and send one to the path for Windows 7, and the other one to the path for Windows XP. (The path for the “winlogon.exe” file, which s/he searched earlier). After this, the virus can be coded to delete the file “winlogon.exe” and simply rename itself “winlogon.exe”. So, on the next startup when the OS looks up this file, it instead unleashes the virus and we’ve got BOOM. Total stealth, total annihilation and the victim has got no clue of what the hell just happened. The other way to do this is to code the virus to edit the path in the registry from it’s default value to where it (the virus) is stored. It can then rename itself and in this case on the next startup the OS doesn’t even go to the actual file but instead to the virus and starts it up. Equally effective.
case on the next startup the OS doesn’t even go to the actual file but instead to the virus and starts it up. Equally effective.
The Best Offense is a Strong Defense Understanding how viruses take hold is the first step in knowing how and where to untangle them from your system once it has been compromised. As viruses become more sophisticated, you can expect them to become more aggressive toward your antivirus software. So what can we do about these nefarious little beasties? We’ve come a long way. Even though the end is not in sight, the roads that lie ahead of us are shorter than the ones behind. Cyber Security today, is tighter than ever but that doesn’t mean we are immune to attacks. If you do have the latest antivirus software and keep your OS updated, you probably don’t need to worry about 99% of all the malcious software out there, but the remaining 1% is the reason why cyber security is a $100 billion market today. Successful attacks are rarer today than ten years ago, but they certainly make up for it in sheer intensity. More and more people each day are relying more and more on their computers, not knowing that simply entering their credit card information on a secure website could be sending all those details to a hacker. Attacks and infections are decreasing in number, but rising in desctructiveness. Today, almost nobody bothers to spread around a virus that simply causes reboots or wipes data, since there’s no real gain for the hacker in it. The malicious softwares today are much more targeted. Clearly, obtaining someone’s social security number or bank pin is much more valuable to a hacker than deleting some random person’s movies and pictures.
The only thing we can do is keep our eyes open and turn around at the slightest hint of trouble. Avoid downloading from unconfirmed sources and make sure your antivirus software and OS is updated. Even if your system is compromised you may never actually know it, but the hacker could have identified that you are an easy target. If just once he could get valuable information from your system, it’s very likely that he will keep the system compromised, silently (make it a slave). Further, make sure to never ever store sensitive or financial information on your computer. Keeping it on an offline system or an external hard drive is much safer.

Popular Posts