Wyly Wade

Tag: DARPA

Plan X — DARPA Sets Cyber Foundations

cybersecurity cyber security Wyly investment

For years, the Pentagon has been open and adamant about the nation’s need to defend itself against cyberattack, but its ability and desire to attack enemies with cyberweapons has been cloaked in mystery. Plan X — an effort to improve the offensive cyberwarfare capabilities “needed to dominate the cyber battlespace,” according to an announcement for the workshop. No…

An Anonymous Messenger — by Tor Foundation

cybersecurity cyber security Wyly investment

As WhatsApp is now overly exposed and other tools like SilentCircles are constantly under pressure to allow for some access to communications the Tor Foundation is launching a new messaging service that rely’s on the Tor network. The Tor Instant Message Bundle (TIMB) will rely on the strength of the Tor networks “hidden services” as…

The Mech is Born

Ekso and 3D Systems has created the first 3D printed robotic exoskeleton suit. Exoskeleton suites are not exactly new but the convenience and exact manufacturing of a 3D printed suit would dramatically improve the usefulness. Other working prototypes of powered exoskeletons, including XOS by Sarcos, and HULC by Lockheed Martin (both meant for military use), have been constructed but have not yet…

MIT: Liquid rechargeable fuel

MIT, Investment, cyber, cyberserity, civergy

A new kind of battery stores energy in what researchers are calling “rechargeable fuel”—electrodes in liquid form. The result . . . theoretically allow an electric car to travel 500 miles on a charge, five times farther than most electric vehicles can now . . . Batteries that use liquid electrodes could also be safer…

Plugging Cyber Warfare Governance: Asia Should Act Now

In cyber space, a virtual realm with no natural or geographic borders, and constantly dynamic packets of data routed from one node to another, the world really is flat. It is also anonymous since identity verification is not yet required and can be masked through complicated routing patterns. A 2011 study, “Cyber security and cyber warfare: Preliminary assessment of…

%d bloggers like this: