Infinity in a grain of sand: neural dust sensors monitor the body from inside


120945_webImagine tiny wireless sensors the size of a grain of sand that can be implanted in the human body to monitor nerves, muscles and organs in real time. … engineers from the University of California, Berkeley recently created these batteryless sensors, opening the door to ‘electroceuticals’ — an emerging field in which these devices are used to treat disorders like epilepsy, stimulate the immune system or reduce inflammation by stimulating nerves and muscles.

Source: Infinity in a grain of sand: neural dust sensors monitor the body from inside

She woke in a pool of blood: hospital misdiagnosed baby who swallowed button battery, coroner hears


What we would give to have another chance to hear your voice, to feel your kiss and to see you grow,” wrote the Rees family in Isabella’s tribute.

At the age of one, Isabella swallowed a button battery. No one knows precisely when. It lodged in her oesophagus, and made her sick.

Her parents took her to hospital several times over two weeks, but staff didn’t pick up the presence of the battery until it was too late, the Coroners Court heard on Thursday.

She died in the morning of February, 4, 2015, from cardiac arrest, on the operating table at Sunshine Hospital.

Source: She woke in a pool of blood: hospital misdiagnosed baby who swallowed button battery, coroner hears

Worksafe New Zealand: New Electrical Equipment Declared Articles (April 2016)


Role of terminology in scientific and technical communication


Luca Mari with assistance from Joanna Goodwin, provides a general introduction to the role of terminology in scientific and technical communication, and particularly to definitions, a critical component of standards documents

Source: IEC – Standards development > Resources: Role of terminology in scientific and technical communication

Customer Letter – Apple Feb 16, 2017


Extract from a letter from Apple to its customers about a US court order threat to its iPhone encryption:

 

Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.

The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.

The Threat to Data Security

Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. Criminals and bad actors will still encrypt, using tools that are readily available to them.

Source: Customer Letter – Apple

Doping Lithium-ion Batteries to Make Them Safer


When lithium-ion batteries overheat, they can burn through internal pockets, burst into flames, and even explode. One reason such damage can occur is the formation of dendrites—finger-like deposits of lithium that can grow long enough to pierce the barrier between a lithium-ion battery’s halves and cause it to short out.

Dendrites form when a battery electrode degrades and metal ions deposit onto the electrode’s surface. …

In their latest work, Stanford researchers used chemicals designed to prevent dendrite formation.

see: http://spectrum.ieee.org/energywise/consumer-electronics/portable-devices/doping-lithiumion-batteries-to-make-them-safer

 

2015 Ig Nobel Prizes Announced | In Compliance Magazine


Not to be confused with the Nobel Prizes, the Ig Nobel Prizes are intended to “honor achievements that first make people laugh and then make them think.” – see the article in the link:

Source: 2015 Ig Nobel Prizes Announced | In Compliance Magazine

IBM engineers carbon nanotube transistors to replace silicon in computing | VentureBeat | Business | by Dean Takahashi


Carbon nanotubes are the leading candidate to replace silicon in semiconductor chips after the decades-long run of silicon electronics runs out. And IBM is hoping to usher along that transition with a new breakthrough being announced today. In the October 2 issue of the journal Science, IBM researchers say they have overcome one of the most daunting challenges around carbon nanotube transistors, which are the building blocks of electronic circuits with dimensions that are measured in billionths of a meter.  Carbon nanotube chips could greatly improve the capabilities of high-performance computers, enabling Big Data to be analyzed faster, increasing the power and battery life of mobile devices and the Internet of Things, and allowing cloud data centers to deliver services more efficiently and economically, IBM said.

Source: IBM engineers carbon nanotube transistors to replace silicon in computing | VentureBeat | Business | by Dean Takahashi

Solid-state Electrolyte could make batteries safer and longer-lasting | MIT News


Researchers at MIT and Samsung, and in California and Maryland, have developed a new approach to one of the three basic components of batteries, the electrolyte. The new findings are based on the idea that a solid electrolyte, rather than the liquid used in today’s most common rechargeables, could greatly improve both device lifetime and safety — while providing a significant boost in the amount of power stored in a given space.

Typically a liquid organic solvent whose function is to transport charged particles from one of a battery’s two electrodes to the other during charging and discharging — has been responsible for the overheating and fires that, for example, resulted in a temporary grounding of all of Boeing’s 787 Dreamliner jets …

““All of the fires you’ve seen, with Boeing, Tesla, and others, they are all electrolyte fires. The lithium itself is not flammable in the state it’s in in these batteries. [With a solid electrolyte] there’s no safety problem — you could throw it against the wall, drive a nail through it — there’s nothing there to burn.”

Source: Going solid-state could make batteries safer and longer-lasting | MIT News

How Lithium Batteries Become a Workplace Hazard – Lion Technology


Overview:

A battery can catch fire due to an internal short circuit. When a short circuit occurs, it causes overheating of the cells within a battery, which can ultimately lead to a condition known as “thermal runaway”, which doesn’t typically confine itself to just one cell. Increasing pressure and temperature within a cell can cause it to explode and vent its contents. This can lead to neighboring cells going into thermal runaway as well.

Lithium fires are unique in that they are not typically extinguished in the same manner as ordinary combustible fires. Depending on the type of battery, non-traditional extinguishing agents, such as halotron or copper powder, may be needed. A lithium metal fire is treated differently from a lithium-ion fire in that each requires different firefighting agents.

See more information at via How Lithium Batteries Become a Workplace Hazard – Lion Technology.

How Google’s Autonomous Car Passed the First U.S. State Self-Driving Test – IEEE Spectrum


How Google’s Autonomous Car Passed the First U.S. State Self-Driving Test – IEEE Spectrum.

“Perhaps overly cautious approaching some lights,” he wrote. The other column shows that Google’s car was not tested on roundabouts. There were similar checks for railroad crossings, unpaved roads, school zones, and shopping centers. In communication with the Nevada DMV before the test, Google said its policy was to prohibit autonomous operation at railroad crossings that lack signals and for human drivers to take over. It also noted: “[Roundabouts are] particularly challenging, where many drivers don’t know the proper rules in the first place.” In an e-mail to colleagues at the DMV, Breslow wrote, “We can’t fail an applicant for not being able to navigate a traffic circle if they say that there [sic] vehicle can’t yet do it.”

What would the Prius do when confronted by something unexpected? That happened several times during the 22-km test drive. At one point, a bicycle weaved in front of the car. The car backed off before passing the cyclist safely. The Prius also correctly anticipated a pedestrian running across the street. Construction work, however, proved trickier. When faced with a partially blocked-off road, the car switched between autonomous and manual modes and then braked to a halt, requiring  the safety driver to take control. Wojcik also recorded that the car needed driver assistance with some turns, although she did not note the circumstances.