Farm Drones
That sound you hear is a swarm of drones,
revving their tiny engines as they wait for the Federal Aviation Administration
to update its rules on commercial UAV flight. The biggest beneficiaries may be
farmers who hope to use cheap UAVs armed with cameras to monitor the health of
their crops, employing aerial photography—digital and infrared—to fine-tune
delivery of water, fertilizer, and other chemicals. To tap that hungry market,
companies such as Indiana-based PrecisionHawk have developed simple
plug-and-play sensors and data-processing software for use with their 3-pound
GPS-guided Lancaster UAV. For now the FAA rules governing farm use are vague
(no one has gotten into trouble yet), but the agency is expected to clarify
things this year and issue final rules in 2015.
In-Memory Computing
In traditional computer architecture,
there's memory (the 6 GB of RAM in your laptop that provides lightning-quick
access to the data required to run your applications), and then there's storage
(a 1 TB hard drive, slow and inefficient to access but spacious enough to
archive your many files). The same dichotomy holds true for massive-data
centers, which makes it hard to analyze big-data sets without the delays
inherent in retrieving each piece of data from the clunky spinning disk where
it's stored. But now that flash memory is relatively inexpensive and getting
cheaper by the year, companies such as SAP and Oracle are experimenting with a
radical alternative: stowing all your data right in memory. This in-memory
computing offers dramatic increases in speed and, by some estimates, energy
savings of up to 80 percent for big-data centers. With the release of Violin
Memory's inexpensive in-memory storage cards, individual servers can now take
advantage of those benefits too.
IPv6
In February 2011 the Internet officially
ran out of IP addresses. You probably didn't notice, because new devices
continue to connect to the Web via address-sharing work-arounds. But those are
stopgap measures. It's time for a wholesale shift from the 32-bit,
4.3-billion-address IPv4 system developed in the 1970s to the 128-bit IPv6 and
its mind-boggling 340 trillion trillion trillion addresses. To complete the
change, every website and Internet provider has to buy in, updating equipment
when necessary. At the moment only about 2 percent of Google's traffic arrives
via IPv6. Will the world get its act together in time to avoid missed
connections? Many holdouts are looking to Washington for the answer: The White
House has mandated that all government servers switch to IPv6 by October.
Muon Tomography
Though very similar to computed tomography
(better known as CT scanning), muon tomography offers one key advantage:
Instead of assembling images with radioactive X-rays, it uses particles created
naturally in the upper atmosphere by the cosmic rays that constantly bombard
Earth. These particles, known as muons, penetrate much more deeply than X-rays,
which means they can pass through shielding materials like lead—and that makes
them perfect for detecting nuclear material hidden in shipping containers.
Virginia-based Decision Sciences, working with Los Alamos National Lab, has
developed the Multi-Mode Passive Detection System, which can scan a 40-foot
shipping container in 30 seconds, looking for the telltale ways in which muons
are deflected by uranium and plutonium. And before year's end, the company
plans to introduce a software upgrade that will enable the device to detect
conventional electronics and other contraband. It comes as no surprise that the
departments of Defense and Homeland Security have already signed up to use the
technology.
Personal-Data Auctions
In 2000 a public outcry forced Yahoo and
eBay to cancel their plans to auction personal data collected from 200,000
people by a marketing company. Today that data is more accessible and more
valuable than ever, but people still strive to protect it. Public sentiment may
be changing, though. Last year an NYU student served up two months' worth of
private data mined from his digital devices in a Kickstarter campaign. The
stunt raised $2733 from 213 amused backers. Now startups such as Washington,
D.C.–based Personal are betting that others will follow suit, lumping their
online accounts together in one place for convenience and for profit. Once
their data is collected, they can choose whether to part with chunks of it—in
exchange for special deals and other enticements, that is.
Organ-On-A-Chip
Drugs that work well in a petri dish—or
even in a mouse—often turn out to be ineffective or dangerous in humans. That's
why researchers at Harvard's Wyss Institute for Biologically Inspired
Engineering set out to create computer chips capable of simulating the
functions of real organs. The lung-on-a-chip has a membrane lined with human
lung cells on one side and blood-vessel cells on the other. Air flows across
the lung-cell side and a blood-like liquid flows across the other. The device
even expands and contracts as it "breathes." Scientists are currently
working with the Food and Drug Administration to test counter-radiation drugs
on bone marrow, gut, and lung chips. The next step is bolder yet: a $37 million
DARPA-funded plan to link various chips in what amounts to a
whole-human-body-on-a-chip.
3D Counterfeiting
In February a series of 3D-printer patents
will expire, clearing the way for a flood of cheap professional machines.
That's good news for small manufacturing shops but bad news for companies that
make highly desirable—and easily copied—objects such as jewelry and sunglasses.
Rogue websites like thepiratebay.sx have already added sections to distribute
the printing specs, pulled from pirated blueprints or 3D scans of the
originals, for such objects. While designers wrestle with how to insert digital
rights management codes in 3D-printer files, some experts predict that by 2018
companies will be losing $100 billion a year in intellectual property. The more
immediate issue for everyone, though, is figuring out exactly what is protected
by copyright (for creative work) and patent (for useful devices). A screw? No
big deal. A replacement part for your car? That's trickier.
Semiautonomous Driving
We still have a way to go before cars pilot
themselves to the office, but, little by little, technology is now assisting us
with the driving. Ford, Audi, and Volvo have designed vehicles that can park
themselves. GM's hands-free Super Cruise control will adjust the steering and
the brakes to keep your car at a safe remove from the SUV ahead. The Direct
Adaptive Steering system in Nissan's Infiniti Q50 uses circuits to sidestep the
rack-and-pinion system, speeding up the response time between steering wheel
and tires, maybe even paving the way for vehicles operated by joysticks. Cool?
You bet, but advances like these also have the potential to make for safer
roads, fewer bottlenecks, and, yes, hands idle enough for you to enjoy a donut
with your coffee.
Bioprinting
Imagine taking an inkjet printer, filling
it with bio-ink made from stem cells, and printing a new kidney for anyone who
needs a transplant. The process is a little more complicated than that, of
course, particularly when working with multiple cell types or tubular
structures, but after years of research that incredible scenario is almost
within our reach. San Diego–based Organovo, which unveiled the first commercial
3D bioprinter in 2009, expects to release functional human liver tissue in 2014
that drug companies can use for medical research. Scientists are also working
on printable bone and wound-healing materials. It's still a big leap from there
to a fully transplantable organ, but take heart: Now you don't have to be a
science-fiction fan to believe it's possible.
Active Cyber Defense
Even the walls of classified military
networks are vulnerable to hackers. So in 2012 DARPA launched an Active Cyber
Defense program. Think preemptive strikes. Proponents aim to identify and
disarm would-be attackers with, say, fake data. The startup CrowdStrike is
bringing the same aggressive approach to the private sector, promising to use
big-data analytics to monitor real-time activity in client networks. Some
advocates are even pushing for changes in privacy laws for permission to hack
into an adversary's network to retrieve or destroy stolen data.
0 comments:
Post a Comment