Researcher are developing technology to translate thought into messages that can be wirelessly delivered. Funded by the US military ('natch), the aim is "synthetic telepathy," using EEG signals monitored non-invasively to communicate by brainpower alone. Apparently, this research goes back to the 1960s when a scientist used EEG to communicate in Morse code. Now though, the scientist are using brain scans to better understand how to detect and identify the brain signals. From MSNBC:
The Army grant to researchers at University of California, Irvine, Carnegie Mellon University and the University of Maryland has two objectives. The first is to compose a message using, as (UC Irvine professor Mike) D'Zmura puts it, "that little voice in your head."
The second part is to send that message to a particular individual or object (like a radio), also just with the power of thought. Once the message reaches the recipient, it could be read as text or as a voice mail...
Mapping the brain's response to most of the English language is a large task, and D'Zmura says that it will be 15-20 years before thought-based communication is reality.
On Monday, the Supreme Court will review the 9th Circuit's decision in Apple Inc. v. Pepper, in which the plaintiffs argue that Apple has established a monopoly over apps for Ios (this part is actually incontrovertible, as Apple has used both technology and law to prevent rival app stores from operating), and that Iphone and […]
I’ve mentioned it online before, but here we go: Two years ago, my wife and I decided to leave our rented home behind and move into a 40-foot RV. We spend our spring and summer in Alberta, Canada where she has a job for six months of the year working as an addictions counselor. The […]
Androkavo tests some of the cheap eBay solder against the brand-name stuff; it gets there in the end, but it’s surely not the advertized 60/40 alloy and needs to be close to 400° before it behaves itself.
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]
The human eye is a powerful thing, but it’s not so great at seeing in the dark or around tight spaces, which is partially why most of us struggle with unplugging drains, cleaning under the fridge, and other hard-to-reach jobs. This 1080p HD Waterproof WiFi Wireless Endoscopic Camera, however, gives you the flexibility necessary to get […]
Macs are undeniably some of the most versatile computers on the market, but they can do so much more than what their stock apps allow. For those looking to get the most out of their Mac hardware, the Pay What You Want 2018 Super Mac Bundle features 10 of the industry’s top apps, including photo editors and […]