|
|
|
|
Using Wi-Fi To Count People Through Walls
Whether you're trying to figure out how many students are attending your lectures or how many evil aliens have taken your Space Force brethren hostage, Wi-Fi can now be used to count them all. The system, created by researchers at UC Santa Barbara, uses a single Wi-Fi router outside of the room to measure attenuation and signal drops. From the release: "The transmitter sends a wireless signal whose received signal strength (RSSI) is measured by the receiver. Using only such received signal power measurements, the receiver estimates how many people are inside the room -- an estimate that closely matches the actual number. It is noteworthy that the researchers do not do any prior measurements or calibration in the area of interest; their approach has only a very short calibration phase that need not be done in the same area." This means that you could simply walk up to a wall and press a button to count, with a high degree of accuracy, how many people are walking around. The system can measure up to 20 people in its current form. |
|
|
|
There are no conversations. |
|
|
|
|
Bill James |
Some people give themselves over to their most evil desires, and those people becomes evil. But in general, it's reductive to think of evil as something foreign and separate from the rest of us. Evil is part of everyone. We all have the capacity to commit evil acts. |
Henry Ward Beecher |
Greatness lies, not in being strong, but in the right using of strength; and strength is not used rightly when it serves only to carry a man above his fellows for his own solitary glory. He is the greatest whose strength carries up the most hearts by the attraction of his own. |
Terry Eagleton |
People do evil things because they are evil. Some people are evil in the way that some things are coloured indigo. They commit their evil deeds not to achieve some goal, but just because of the sort of people they are. |
Rick Baker |
I always wanted to make aliens that looked like '60s aliens. |
Michael Ignatieff |
Patriotism is strong nationalistic feeling for a country whose borders and whose legitimacy and whose ethnic composition is taken for granted. |
Mencius |
Evil exists to glorify the good. Evil is negative good. It is a relative term. Evil can be transmuted into good. What is evil to one at one time, becomes good at another time to somebody else. |
Anthony Edwards |
I'm the youngest of five kids, and I wanted attention. And in Santa Barbara, there was lots of theater going on, so for that area, it was a little bit like playing Little League baseball. There were dance classes, theater classes, and I just loved it. |
Jose Canseco |
Owners, the way they blackballed me from baseball, the way they used me, in a sense, and then the way they wanted to send a signal to the other players, saying, you know, we're going to get Jose Canseco out of the game. This is a cue or a message for you other guys to stop using steroids because the owners lost total control of the steroid use. |
Andrew Card |
Scholarships that allow students to get a good education are important, but first we want to measure the progress that the schools are teaching our students, we want to hold them accountable for the progress, we want to hold the schools accountable for teaching the young people in America. |
Shmuel Yosef Agnon |
Through these offices it was my privilege to get to know almost every Jewish person, and those whom I did not come to know through these offices I came to know through love and a desire to know my brethren, the members of my people. |
|
|
Engineers Say They've Created Way To Detect Weapons Using Wi-Fi
The researchers, which include engineers from Rutgers University-New Brunswick, Indiana University-Purdue University Indianapolis (IUPUI), and Binghamton University, published a study this month detailing a method in which common wifi can be used to easily and efficiently identify weapons, bombs, and explosive chemicals in public spaces that don't typically have affordable screening options. The researchers' system uses channel state information (CSI) from run-of-the-mill wifi. It can first identify whether there are dangerous objects in baggage without having to physically rifle through it. It then determines what the material is and what the risk level is. The researchers tested the detection system using 15 different obje...
|
|
|
|
MIT's AI Uses Radio Signals To See People Through Walls
Researchers at the Massachusetts Institute of Technology have developed a new piece of software that uses wifi signals to monitor the movements, breathing, and heartbeats of humans on the other side of walls. While the researchers say this new tech could be used in areas like remote healthcare, it could in theory be used in more dystopian applications. Inverse reports: "We actually are tracking 14 different joints on the body [...] the head, the neck, the shoulders, the elbows, the wrists, the hips, the knees, and the feet," Dina Katabi, an electrical engineering and computer science teacher at MIT, said. "So you can get the full sti...
|
|
|
|
What a Trip: First Evidence for Higher State of Consciousness Found
Summary: Researchers observe a sustained increase in neural signal diversity in people under the influence of psychedelics.
Source: University of Sussex.
Scientific evidence of a ‘higher’ state of consciousness has been found in a study led by the University of Sussex. ...
|
|
|
|
Facebook Filed a Patent To Calculate Your Future Location
Facebook has filed several patent applications with the U.S. Patent and Trademark Office for technology that uses your location data to predict where you're going and when you're going to be offline. BuzzFeed News reports: A May 30, 2017, Facebook application titled "Offline Trajectories" describes a method to predict where you'll go next based on your location data. The technology described in the patent would calculate a "transition probability based at least in part on previously logged location data associated with a plurality of users who were at the current location." In other words, the technology could also use the data of ...
|
|
|
|
Dream Journal Entry 2: I worked for a Software/Scotch Making company. I began as Cho from the Mentalist and there was an attack on our software due to an oscillating signal between 1024Hz and 4096Hz. I was able to use my telescoping stick to locate the source of the signal, a cold war era radio with a swirling red swirl located directly behind my overweight partner (who wore a necklace made of a 50's era television). We stopped the signal (which was actually my alarm to wake up) but it began again (cause I clearly hadn't woken up yet). However, this test of my skills under pressure proved to be enough to show my dedication to this company and allow me, now a little girl of age 9 or 10, to become the CEO. I was ushered into an office with photos of our previous CEOs (all Russian and British royalty along with Anna Karenina). To initiate me into the company, I had to drink a random assortment of the different Scotch's distilled by families who worked for our company. In the end I had t...
|
|
|
|
WikiLeaks Dump Reveals CIA Malware For Tracking Windows Devices Via WiFi Networks
WikiLeaks has published the documentation manual for an alleged CIA tool that can track users of Wi-Fi-capable Windows devices based on the Extended Service Set (ESS) data of nearby Wi-Fi networks. According to the tool's 42-page manual, the tool's name is ELSA. Bleeping Computer has an image embedded in its report that explains how the tool works. There are six steps that summarize the ELSA operation. Bleeping Computer reports: Step 1: CIA operative configures ELSA implant (malware) based on a target's environment. This is done using a tool called the "PATCHER wizard," which generates the ELSA payload, a si...
|
|
|
|
WPA2 Security Flaw Puts Almost Every Wi-Fi Device at Risk of Hijack, Eavesdropping
A security protocol at the heart of most modern Wi-Fi devices, including computers, phones, and routers, has been broken, putting almost every wireless-enabled device at risk of attack. From a report: The bug, known as "KRACK" for Key Reinstallation Attack, exposes a fundamental flaw in WPA2, a common protocol used in securing most modern wireless networks. Mathy Vanhoef, a computer security academic, who found the flaw, said the weakness lies in the protocol's four-way handshake, which securely allows new devices with a pre-shared password to join the network. That weakness can, at its worst, allow an atta...
|
|
|
|
Mike Pence and Trump Administration on Space:
Pence said, "Space is, in his words, a war-fighting domain just like land and air and sea." He added, "History proves that peace only comes through strength, and in the realm of outer space, the United States Space Force will be that strength in the years ahead."
|
|
|
|
No does engagement with metaphysics automatically signal insufficient rationality.
This post is a comment.
|
|
|
|
we can use my wifi pineapple and stick it to the man that way
This post is a comment.
|
|