Holthausen Group, un fournisseur de gaz aux Pays-Bas, a transformé une Tesla Model S en lui adjoignant une pile à combustible. Résultat, une autonomie de 1 000 kilomètres.
THE RACE BETWEEN KNOWLEDGE AND DATA IN MEDICINE
Researchers, doctors and biologists benefit from the massive amount of available information as health data becomes digitized. But it also becomes harder and harder for human brains to uncover the complexity and extract insights. Data is generated at a much faster pace than knowledge. This is THE scientific challenge. We need to create the tools to help human collective intelligence extract knowledge from this influx of data. Parts of these technologies already exist, parts need to be invented. OWKIN creates AI technologies to advance knowledge and discover the medicine of tomorrow.
Joan Greenbaum is an activist, writer and professor. She has written extensively on concerns dealing with work, technology, and gender. She was one of the founders of Computer People for Peace, a…
United Nations Secretary-General António Guterres announced today the appointment of Fabrizio Hochschild Drummond of Chile as his Envoy on Technology. Taking into account the growing prominence of technology issues and the recognition that the United Nations must enhance its efforts on digital cooperation and global connectivity, the Envoy will lead the implementation of the
The first edition of REthinking Energy, the flagship series from the International Renewable Energy Agency (IRENA), analyses the transformation of the global power sector while reviewing progress in the transition to a sustainable energy future. An alignment of economic forces, global population growth, the threat of climate change and rapid technological advances has set in motion a transformation of the global energy system. A new system based on renewables would enhance energy access and security, create jobs and safeguard health and the environment, IRENA’s report argues.
Cognitive Design 2005 @mprove Technological Dreams & Nightmares – An Outlook To The (Near) Future Hermann Maurer, Professor at the Technical University of Graz, Director IICM & Chairman Hyperwave Inc. Memory, Plato etc ca 23 min into the video "what we really have to think about is not how we learn but whnhat we should learn" "we are on very shake grounds
Safiirilasi, kehittynyt akku ja huipputehoa. Siinäpä joitakin Canonicalin Ubuntu Edge -puhelimen ominaisuuksia. Mutta Linux-luuria ei tule, jos netin joukkorahoittajat eivät lähde mukaan. I t-viikko 23.7.2013 14:43
By Yoshifumi Takemoto and Alan Katz - March 12, 2008 "From a windswept corner of Hokkaido, Japan's northernmost island, Japan Steel Works Ltd. controls the fate of the global nuclear-energy renaissance. There stands the only plant in the world, a survivor of Allied bombing in World War II, capable of producing the central part of a nuclear reactor's containment vessel in a single piece, reducing the risk of a radiation leak."
Aamulehti 20.2.2012: "Keinolihaa jo vuosia kehittänyt hollantilaistutkija Mark Post kertoi sunnuntaina, että ensimmäinen keinolihasta leivottu hampurilaispihvi on tarkoitus nauttia lokakuussa. Missä ja milloin tämä tapahtuu, on vielä tarkkaan varjeltu salaisuus. Myöskään sitä Post ei kertonut, kuka saa ensimmäisenä maistaa synteettistä lihaa. Mark Post puhui toimittajille sunnuntaina Vancouverissa Kanadassa järjestettävällä Yhdysvaltain tiedeviikolla."
Publit Sweden AB gör det ständigt enklare att publicera böcker. Publit samarbetar idag med flera av Sveriges ledande bokförlag. Iceberg är utvecklat av det amerikanska företaget ScrollMotion. Till skillnad från till exempel Stanza, som använder kataloger, ligger läsaren i själva boken. Iceberg har snabbt vunnit marknadsandelar och ägnades särskild uppmärksamhet på Apples årliga utveckarkonferens i augusti.
n The Net Delusion, by Evgeny Morozov, we finally have a long-overdue market correction to cyber-utopianism, which Morozov defines as “a naïve belief in the emancipatory nature of online communication that rests on a stubborn refusal to acknowledge its do
"The Boeing X-37 (Advanced Technology Demonstrator) is an American unpiloted spaceplane operated by the U.S. Air Force for orbital spaceflight missions. It is a reusable robotic spacecraft that is a 120 percent–scaled derivative of the X-40A." Also htt
Yhdysvalloissa on esitelty keksintö, joka voisi mullistaa jopa koko maailman energiantuotantoa. Bloom Energy -yhtiö on esitellyt polttokennoon perustuvan laitteen, joka tuottaa edullisesti vihreää energiaa. Ensimmäinen asiakas on, kukapa muukaan kuin Goog
Diana Bronson: "...we still believe that there should be an exclusion for geoengineering technologies, for any of the enhancement measures that are now envisaged under this new technology body, and that there should be means of assessment and also of prec
Copenhagen, December 10, 2009 – Over 160 civil society groups, including social movements and non-governmental organizations (NGOs), today released a joint declaration on technology: “Let's Look Before We Leap!”. The declaration alerts governments to the
En kinesisk solskenshistoria. Thursday, October 12, 2006 By Andrew Batson in Wuxi, China, The Wall Street Journal. "When he arrived in Australia 18 years ago as a physics student, Shi Zhengrong scraped by on a meager stipend from the Chinese government t
If developed sensibly, nuclear power could be truly sustainable and essentially inexhaustible and could operate without contributing to climate change. In particular, a relatively new form of nuclear technology could overcome the principal drawbacks of cu
Links to web pages containing news (2004-2008) of TREC, the DESERTEC proposals, CSP or HVDC (or any combination of those things). On other pages, there is related news and an archive of news reports about TREC.
Steven J. Vaughan-Nichols, Computerworld: "Thanks to Windows' security weaknesses, botnets are now commonplace and we can only expect to see more DDoS attacks in the future." Botnets.
En fransman och en tysk - ett sådant par har aldrig delat Nobelpriset förr. Men nu har det hänt: oberoende av varandra upptäckte Albert Fert och Peter Grünberg jättemagnetoresistans, ett magnetiskt fenomen på kvantnivå. På kuppen blev de faddrar till en n
An international team of scientists has performed the ultimate miniaturisation of computer memory: storing information inside the nucleus of an atom. This breakthrough is a key step in bringing to life a quantum computer - a device based on the fundamenta
Haluamme ratkaista tuulivoiman käyttöä haittaavaan varastointiongelman yhdistämällä uusinta tekniikkaa maailman vanhimpaan energiamuotoon, kertoo Clausthalin teknisen yliopiston tukija Marko Schmidt. Harzin kokeilun ydinosa on "virtuaalinen” voimalaitos,
QUESTION by Erik Meijer (GUE/NGL) to the Commission Subject: Aircraft condensation trails which no longer only contain water but cause persistent milky veils, possibly due to the presence of barium, aluminium and iron
It is a web-based survey tool. There are professionals who can help students to design their survey, get the most out of the technology, and support their efforts.
Vivek Wadhwa: "My prediction is that 2015 will be the year in which tech takes baby steps in transforming medicine. The technologies that make this possible are advancing at exponential rates; their power and performance are increasing dramatically even as their prices fall and footprints shrink. The big leaps will start to happen at around the end of this decade."
"Vivek Wadhwa is a Fellow at Arthur & Toni Rembe Rock Center for Corporate Governance, Stanford University; Director of Research at the Center for Entrepreneurship and Research Commercialization at the Pratt School of Engineering, Duke University; and Distinguished Fellow at Singularity University. "
H. TARIQ, W. YANG, I. HAMEED, B. AHMED, and R. KHAN. IJIRIS:: International Journal of Innovative Research Journal in Information Security, Volume IV (Issue XII):
01-07(December 2017)1 Hugh A. Chipman, Edward I. George, and Robert E. McCulloch. “Bayesian CART Model Search.” Journal of the American Statistical Association, Vol. 93(443), pp 935–948, September 1998. 2 Sujata Garera, Niels Provos, Monica Chew, and Aviel D. Rubin. “A framework for detection and measurement of phishing attacks.” In Proceedings of the 2007 ACM workshop on Recurring malicious code - WORM ’07, page 1, 2007. 3 Abhishek Gattani, AnHai Doan, Digvijay S. Lamba, NikeshGarera, Mitul Tiwari, Xiaoyong Chai, Sanjib Das, Sri Subramaniam, AnandRajaraman, and VenkyHarinarayan. “Entity extraction, linking, classifica- tion, and tagging for social media.” Proceedings of the VLDB Endowment, Vol. 6(11), pp 1126–1137, August 2013. 4 David D. Lewis. Naive (Bayes) at forty: The independence assumption in information retrieval. pages 4–15. 1998. 5 Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker. “Learning to detect malicious URLs.” ACM Transactions on Intelligent Systems and Technology, Vol. 2(3), pp 1–24, April 2011. 6 FadiThabtah Maher Aburrous, M.A.Hossain, KeshavDahal. “Intelligent phishing detection system for e-banking using fuzzy data mining.” Expert Systems with Applications, Vol. 37(12), pp 7913–7921, Dec 2010. 7 AnkushMeshram and Christian Haas. “Anomaly Detection in Industrial. Networks using Machine Learning: A Roadmap.” In Machine Learning for Cyber Physical Systems, pages 65–72. Springer Berlin Heidelberg, Berlin, Heidelberg, 2017. 8 Xuequn Wang Nik Thompson,Tanya Jane McGill. “Security begins at home: Determinants of home computer and mobile device security behavior.” Computers & Security, Vol. 70, pp 376–391, Sep 2017. 9 Dan Steinberg and Phillip Colla. “CART: Classification and Regression Trees.” The Top Ten Algorithms in Data Mining, pp 179–201, 2009. 10 D. Teal. “Information security techniques including detection, interdiction and/or mitigation of memory injection attacks,” Google patents. Oct 2013. 11 Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, and Dawn Song. “Design and Evaluation of a Real-Time URL Spam Filtering Service.” In 2011 IEEE Symposium on Security and Privacy, pp 447–462. May 2011. 12 Sean Whalen, Nathaniel Boggs, and Salvatore J. Stolfo. “Model Aggregation for Distributed Content Anomaly Detection.” In Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop - AISec ’14, pp 61–71, New York, USA, 2014. ACM Press. 13 Ying Yang and Geoffrey I. Webb. “Discretization for Naive-Bayes learning: managing a discretization bias and variance.” Machine Learning, Vol. 74(1), pp 39–74, Jan 2009..