web analytics
a

Facebook

Twitter

Copyright 2015 Libero Themes.
All Rights Reserved.

8:30 - 6:00

Our Office Hours Mon. - Fri.

703-406-7616

Call For Free 15/M Consultation

Facebook

Twitter

Search
Menu
Westlake Legal Group > Posts tagged "fnc/tech"

FaceApp Challenge offers hilariously geriatric results

The viral #FaceAppChallenge has everyone from celebrities to fictional characters and even Las Vegas hotels posting elderly looking photos of themselves.

The Jonas brothers previewed their year 3000 reunion tour.

FACEAPP SECURITY CONCERNS: EXPERTS SAY RUSSIANS MIGHT OWN YOUR OLD PHOTOS

Chef Gordon Ramsay made it clear he intends to host “Master Chef” for a while longer.

“OLD TERRY CAN STILL KICK SOME A-!” Terry Crews wrote.

Kevin Hart admired his “strong a- old man face and upper body.”

Even Cookie Monster got into the act – but he looked as timeless as ever.

The Twilight Saga had the same problem.

The Luxor Hotel and Casino in Las Vegas also poked a little fun with the Sphinx.

Westlake Legal Group faceapp FaceApp Challenge offers hilariously geriatric results fox-news/tech fox-news/entertainment/genres/viral fox-news/entertainment/celebrity-news fox-news/entertainment fox news fnc/tech fnc Brie Stimson article 2a85577e-7d05-5fb6-99f1-5816121b619e

(Faceapp.com)

FaceApp has been around since 2017, but the update allows users to age themselves with the help of artificial intelligence. The app also collects data from your phone and may give the Russia-based developer rights to your photos forever, according to Global News.

Westlake Legal Group faceapp FaceApp Challenge offers hilariously geriatric results fox-news/tech fox-news/entertainment/genres/viral fox-news/entertainment/celebrity-news fox-news/entertainment fox news fnc/tech fnc Brie Stimson article 2a85577e-7d05-5fb6-99f1-5816121b619e   Westlake Legal Group faceapp FaceApp Challenge offers hilariously geriatric results fox-news/tech fox-news/entertainment/genres/viral fox-news/entertainment/celebrity-news fox-news/entertainment fox news fnc/tech fnc Brie Stimson article 2a85577e-7d05-5fb6-99f1-5816121b619e

Real Estate, and Personal Injury Lawyers. Contact us at: https://westlakelegal.com 

Elon Musk wants to merge our brains with computers by 2020

If there is an adjective to describe Elon Musk, ambitious is at the top of the list.

Taking time from his day jobs running Tesla and SpaceX, Musk told an audience of onlookers on Tuesday night that Neuralink, a neurotechnology company he co-founded, will be able to merge human brains with computers as soon as 2020. While the claim surprised many, it is an idea that has been proposed and bandied about in the realms of science fiction and futurists for decades.

Musk, who said the main reason for doing the presentation was recruiting, admitted that the Neuralink scientists had been able to get a monkey to control a computer with its brain, a revelation that surprised some of the company’s scientists, according to The Verge.

Westlake Legal Group elon-musk Elon Musk wants to merge our brains with computers by 2020 fox-news/person/elon-musk fox news fnc/tech fnc Chris Ciaccia article 9ff84037-5145-55d4-b000-83d5ba1019f1

 (AP Photo/Jae C. Hong, File)

HUMAN BRAINS COULD BE CONNECTED TO THE INTERNET IN ‘NEXT FEW DECADES,’ SCIENTISTS PREDICT

“We hope to have this in a human patient by the end of next year,” Musk added. For this, it will eventually need approval from the U.S. Food and Drug Administration.

According to a white paper (first spotted by Stat News) released by the company on Tuesday, Neuralink has already been successful in some of its animal trials using brain-machine interfaces (BMIs), which Neuralink believes “hold[s] promise for the restoration of sensory and motor function and the treatment of neurological disorders.”

The paper notes that the system of inserting electric implants into animals skulls by drilling holes has achieved a spiking yield or success rate of 85.5 percent.

“We will painlessly laser-drill the holes into the skull, place the threads, plug the hole with the sensor, and then you go home,” Neuralink president Max Hodak said in an interview with Bloomberg. “It’ll basically be an experience like getting Lasik.”

Neuralink is “developing ultra-high bandwidth brain-machine interfaces to connect humans and computers,” according to the San Francisco-based company’s sparsely populated website.

The device that would go into humans would be slightly different than the one used in animal testing. This device would be implanted behind the ear, akin to a modern-day hearing aid. From there, words would be inputted into a device such as a computer or a phone and allow the person to navigate various tasks on the screen.

“We will painlessly laser-drill the holes into the skull, place the threads, plug the hole with the sensor, and then you go home.” 

— Max Hodak, Neuralink president

Benn Lamm, the CEO of Hypergiant, a company that uses machine learning and artificial intelligence in their products, believes that Neuralink may be solving a problem humanity may not fully understand.

“We have accepted the narrative about the possibility of AI overlords without challenge and as such, has risen the need for super-human capabilities that can rule over the future AI bad-actors that Musk and other posit,” Lamm said in comments obtained by Fox News. “Yet, I think this sells humanity short. Humans are capable of curbing the destructive potential of AI and humans are capable of employing AI for the benefit of the broader community.”

Lamm added that the merging of man and machine must be done to benefit society — citing examples such as climate change, food shortage and space travel — and not “because of a belief that we must control evil AI.”

In a November 2018 interview, Musk alluded to the fact that Neuralink wants to “redefine what future humans will be.” Its goal is to help humanity “achieve a symbiosis with artificial intelligence and to achieve a democratization of intelligence such that it’s not monopolistically held by governments and large corporations.”

By doing so, Musk believes it could help even the playing field with digital intelligence, which he believes “will exceed biological intelligence by a substantial margin.”

CLICK HERE TO GET THE FOX NEWS APP

Westlake Legal Group elon-musk Elon Musk wants to merge our brains with computers by 2020 fox-news/person/elon-musk fox news fnc/tech fnc Chris Ciaccia article 9ff84037-5145-55d4-b000-83d5ba1019f1   Westlake Legal Group elon-musk Elon Musk wants to merge our brains with computers by 2020 fox-news/person/elon-musk fox news fnc/tech fnc Chris Ciaccia article 9ff84037-5145-55d4-b000-83d5ba1019f1

Real Estate, and Personal Injury Lawyers. Contact us at: https://westlakelegal.com 

AOC, Trump join list of celebs and social media stars as ‘most influential people on the internet’

Westlake Legal Group Ocasio-Trump AOC, Trump join list of celebs and social media stars as 'most influential people on the internet' Sam Dorman fox-news/tech/companies/twitter fox-news/tech fox-news/person/donald-trump fox-news/person/alexandria-ocasio-cortez fox-news/entertainment/media fox news fnc/tech fnc article 23cdb4c3-3b24-54d3-ab40-8b13ba214b00

While Rep. Alexandria Ocasio-Cortez, D-N.Y., and President Trump differ vastly in their political views, a new ranking highlights some common ground between the two.

According to TIME magazine, both are incredibly effective at influencing people on the internet. The two joined a slew of celebrities — including singer Ariana Grande and the Duke and Duchess of Sussex  — on the publication’s list of the “25 Most Influential People on the Internet.”

Other top influencers included conservative author Ben Shapiro, rapper Cardi B, and the Hong Kong protesters.

The list came just as President Trump and Ocasio-Cortez traded barbs on Twitter in what was perhaps their most heated and direct exchange to date. Trump’s online comments about Ocasio-Cortez and other freshman congresswoman ignited a media firestorm involving the most powerful members of Congress.

BIG TECH ‘CENSORSHIP’? REPUBLICAN LAWMAKERS ASK FTC TO PROBE ALLEGATIONS OF BIAS

The incident provoked a speech from House Speaker Nancy Pelosi, D-Calif., on Tuesday when she called on her Republican colleagues to denounce the president’s “racist” tweet about Ocasio-Cortez and others.

Earlier in July, Pelosi downplayed Ocasio-Cortez’s influence by comparing her substantial Twitter following to the few votes she was able to get in opposing a bipartisan border funding package.

On Tuesday, both Trump and Ocasio-Cortez continued battling via Twitter as the latter accused him of being a racist and the former charged progressive lawmakers with hating the United States.

PROGRESSIVE FRESHMEN AMASS MULTI-MILLION-DOLLAR WAR CHEST AMID FEUDS WITH PARTY, TRUMP

Ocasio-Cortez also sparked a prolonged debate about Holocaust references when she used Instagram to accuse immigration enforcement of housing migrants in “concentration camps.”

Trump has long used Twitter as his proverbial bully pulpit, directly attacking Democrats and even using the platform to break news about changes in his administration. As the president struggled to obtain funding for border wall funding, he continually blasted Democrats on Twitter for what he saw as inaction on immigration reform.

CLICK HERE TO GET THE FOX NEWS APP

Trump’s border wall got a boost from Air Force veteran Brian Kolfage, also on the list, who used the internet to crowdfund money for a southern border wall.

Vox writer Carlos Maza, another controversial figure in the Twittersphere, also made the list.

Westlake Legal Group Ocasio-Trump AOC, Trump join list of celebs and social media stars as 'most influential people on the internet' Sam Dorman fox-news/tech/companies/twitter fox-news/tech fox-news/person/donald-trump fox-news/person/alexandria-ocasio-cortez fox-news/entertainment/media fox news fnc/tech fnc article 23cdb4c3-3b24-54d3-ab40-8b13ba214b00   Westlake Legal Group Ocasio-Trump AOC, Trump join list of celebs and social media stars as 'most influential people on the internet' Sam Dorman fox-news/tech/companies/twitter fox-news/tech fox-news/person/donald-trump fox-news/person/alexandria-ocasio-cortez fox-news/entertainment/media fox news fnc/tech fnc article 23cdb4c3-3b24-54d3-ab40-8b13ba214b00

Real Estate, and Personal Injury Lawyers. Contact us at: https://westlakelegal.com 

Bernie Sanders says he’d ‘absolutely’ try to break up Facebook, Google, Amazon

Sen. Bernie Sanders, I-Vt., said Tuesday that he would “absolutely” look to break up Big Tech giants like Facebook, Amazon and Google on antitrust grounds.

Speaking at a Washington Post event, Sanders specifically singled out Facebook as having “incredible power over the economy, over the political life of this country in a very dangerous sense.”

He also stated that Amazon is “moving very rapidly to be a monopoly.”

Sanders’ comments come at a perilous time for Silicon Valley, which is facing increased scrutiny from lawmakers on Capitol Hill and the prospect of being broken up or subjected to stringent new regulations.

BABY NAMED AFTER GOOGLE GETS SWAG FROM TECH GIANT

Westlake Legal Group DOTCOM_1280X720_BIG_TECH_ON_THE_HOT_SEAT Bernie Sanders says he'd 'absolutely' try to break up Facebook, Google, Amazon fox-news/tech/topics/big-tech-backlash fox-news/tech/companies/google fox-news/tech/companies/facebook fox-news/tech/companies/amazon fox news fnc/tech fnc Christopher Carbone article 0f898962-518b-5efd-8190-fcd87d919df8

In recent weeks, Facebook’s cryptocurrency Libra came under fire from lawmakers, the Federal Reserve and the Trump administration, while Republicans accused Google of being biased. The FTC has reportedly come to a settlement with Facebook, the details of which have not been made public, that includes a $5 billion fine.

RUBIK’S CUBE SOLVED BY DEEP LEARNING ALGORITHM IN FRACTION OF A SECOND

“And it’s not just Amazon,” Sanders said, according to Politico. “I think we need vigorous antitrust legislation in this country because you are seeing – you name the area, whether it’s pharmaceuticals, whether it is Wall Street, whether it is high tech – fewer and fewer gigantic corporations owning those sectors.” He would appoint an attorney general “who would break up these huge corporations,” he added.

Westlake Legal Group Bernie-Sanders-thumb Bernie Sanders says he'd 'absolutely' try to break up Facebook, Google, Amazon fox-news/tech/topics/big-tech-backlash fox-news/tech/companies/google fox-news/tech/companies/facebook fox-news/tech/companies/amazon fox news fnc/tech fnc Christopher Carbone article 0f898962-518b-5efd-8190-fcd87d919df8

Democratic presidential candidate Sen. Bernie Sanders, I-Vt., pauses while speaking during a forum on Friday, June 21, 2019, in Miami. (AP Photo/Brynn Anderson)

Sen. Elizabeth Warren, D-Mass.,who is battling Sanders and almost two dozen other candidates for the Democratic 2020 presidential nomination, called for the breakup of Amazon, Google and Facebook back in March.

CLICK HERE FOR THE FOX NEWS APP

Westlake Legal Group DOTCOM_1280X720_BIG_TECH_ON_THE_HOT_SEAT Bernie Sanders says he'd 'absolutely' try to break up Facebook, Google, Amazon fox-news/tech/topics/big-tech-backlash fox-news/tech/companies/google fox-news/tech/companies/facebook fox-news/tech/companies/amazon fox news fnc/tech fnc Christopher Carbone article 0f898962-518b-5efd-8190-fcd87d919df8   Westlake Legal Group DOTCOM_1280X720_BIG_TECH_ON_THE_HOT_SEAT Bernie Sanders says he'd 'absolutely' try to break up Facebook, Google, Amazon fox-news/tech/topics/big-tech-backlash fox-news/tech/companies/google fox-news/tech/companies/facebook fox-news/tech/companies/amazon fox news fnc/tech fnc Christopher Carbone article 0f898962-518b-5efd-8190-fcd87d919df8

Real Estate, and Personal Injury Lawyers. Contact us at: https://westlakelegal.com 

How one woman learned to fly the B-2 stealth bomber

When B-2 stealth bombers attacked Serbia on the opening night of Operation Allied Force in 1999, destroyed Iraqi air defenses during 2003’s “Shock and Awe” and eliminated the Libyan fighter force in 2011 — the attacks were all guided by highly-specialized pilots trained in stealth attack tactics.

Given the dangers of these kinds of missions, such as flying into heavy enemy ground fire from air defenses, confronting the prospect of air attacks and preparing for electronic warfare over hostile territory, B-2 pilots need to be ready.

“We prepare and train every single day in case we get called up tomorrow,” Lt. Col. Nicola Polidor, Commander of Detachment 5 of the 29th Training Systems Squadron, told Warrior in an interview.

While performing missions, B-2 pilots need to maintain the correct flight path, align with specific targeting intelligence and load and prepare weapons, all while manning a digital cockpit to control a wide range of additional variables at one time. Polidor, who trains future B-2 pilots at Whiteman Air Force Base in Missouri, says Air Force pilot trainees have adjusted well to learning a seemingly overwhelming amount of new information.

B-2 BOMBER 30-YEAR ANNIVERSARY: INSIDE A B-2 STEALTH ATTACK

“The biggest challenge for pilots is being able to manage flying for long periods of time at the same time as managing a communications suite and robust weapons package,” Polidor said.

Polidor is only the 10th female B-2 pilot in history.

Westlake Legal Group nicola-polidor-us-air-force How one woman learned to fly the B-2 stealth bomber Warrior Maven Kris Osborn fox-news/tech/topics/us-air-force fnc/tech fnc article 699b950f-115e-57a3-9291-79a8a2e34864

Capt. Nicola Polidor, 393rd Bomb Squadron B-2 Spirit pilot, poses next to a B-2 at Whiteman Air Force Base, Mo., April 23, 2013. Polidor has been flying for eight years and is the 393rd BS training flight commander ((U.S, Air Force photo by Airman 1st Class Shelby R. Orozco/Released))

Training is broken down into an academic phase and a flight phase, with classroom training as the first step. Trainees, Polidor explained, typically spend about two months working on a simulator, before taking their first flight.

“The instructor is in one seat, teaching the trainee how to operate in flight in the other seat. You can fly from either seat and control all facets of the aircraft. Both seats have a glass screen cockpit in front of them and both seats have the stick in front of them,” Polidor said.

Control of the aircraft is carefully managed by both crew members. To change pilot operations from one to another, the crew follows specific protocol. The pilot receiving control says “I have the aircraft,” and the pilot passing over control says “roger.you have the aircraft.”

“At anytime it is understood who is at the controls. The instructor pilot will have hands on the controls, without moving anything….in case the trainee has a problem,” Polidor said.

Part of the glass cockpit in front of the pilot is one of eight displays called the Digital Entry Panel which enables pilots to check hydraulics, electronics, flight controls, environmental conditions, weapons suite.

AIR FORCE SET FOR NUCLEAR-ARMED CRUISE MISSILE FOR 2030

“It is like a flying computer. You enter text into the computer. We can input the pressure, airspeed or target for a weapon from that panel and send it,” Polidor said. “We have autopilot just like a commercial airliner. We are able to maintain altitude without our having to input into the computer system.”

Despite flying more than 40-hour missions, pilots have no bed and no refrigerator, just two seats in a small cockpit and a small area behind them about the same width as the seat. Pilot’s food, Polidor said, needs to be non-perishable items.

“Sometimes we can bring a little blow-up mattress, put in on the floor and take a nap,” she said. “It’s about big enough for someone who is 5ft ‘8 but not big enough for taller people.

Most of all, B-2 pilots focus on “being ready,” as they are often the first to strike in high-intensity conflict. An interesting study from the [Mitchell Institute for Aerospace Studies, called “Building the Future Bomber Force America Needs; The Bomber Re-Vector,”] points to a recent B-2 attack on ISIS terrorists in Libya.

“On January 19, 2017 two B-2s flying from Whiteman AFB, Missouri released dozens of precision munitions on an Islamic State training camp in Libya. This 33-hour mission again showcased the responsiveness, range, and flexibility of the bomber force,” the study, written by Lt. Gen. David Deptula (Ret.) and Douglas Birkey, states.

Deptula, who was involved in planning and preparation for Operation Iraqi Freedom, talked to Warrior about the warzone importance of the B-2.

“The B-2 is one of the most game-changing aircraft ever built…and one of the most cost-effective. One B-2 can deliver the punch of an entire aircraft carrier air wing at several orders of magnitude less in operating cost and personnel,” Deptula said.

Kris Osborn, Managing Editor of WARRIORMAVEN (CLICK HERE) can be reached at krisosborn.ko@gmail.com

Westlake Legal Group nicola-polidor-us-air-force How one woman learned to fly the B-2 stealth bomber Warrior Maven Kris Osborn fox-news/tech/topics/us-air-force fnc/tech fnc article 699b950f-115e-57a3-9291-79a8a2e34864   Westlake Legal Group nicola-polidor-us-air-force How one woman learned to fly the B-2 stealth bomber Warrior Maven Kris Osborn fox-news/tech/topics/us-air-force fnc/tech fnc article 699b950f-115e-57a3-9291-79a8a2e34864

Real Estate, and Personal Injury Lawyers. Contact us at: https://westlakelegal.com 

B-2 bomber 30-year anniversary: Inside a B-2 stealth attack

Slicing through the sky with bat-like wings, eluding enemy radar with stealth technology, quietly destroying enemy air defenses from 50,000 ft and using computers to merge sensor data with targeting information — the Air Force’s B-2 bomber … has been in the air attacking targets for “30-Years.”

“You pull up the weapons suite screen, align the right weapon with the target and provide input into the DEP – Digital Entry Panel. Then, you enter text into the computer,” Lt. Col. Nicola Polidar, Commander of Detachment 5 of the 29th Training Systems Squadron, told Warrior in an interview.

As this happens….the air attack begins.

***** The B-2 took its first flight July 17, 1989 — so now is the “30-Year Anniversary.” ******

B-2 pilots have operated the sleek, curved air-defense-defying platform for sensitive, highly-dangerous missions many times in recent decades. After blasting onto the scene in the early 90s, the B-2s combat debut came in the late 90s when the aircraft destroyed Serbian targets over Kosovo. Three decades ago, the Air Force and Northrop Grumman thought to massively advance the paradigm for stealth attack, and create a first-of-its kind leap ahead bomber. It was conceived of as a Cold War weapon, engineered to knock out Soviet advanced air defenses. The intent was to build upon and surpass the F-117 Night Hawk’s stealth technology used in the Gulf War.

AIR FORCE SET FOR NEW NUCLEAR-ARMED MISSILE FOR 2030

The B-2s stealth configuration, buried engine, low heat signature and “radar absorbent” coating, is meant to not only avoid being hit by enemy weapons, but complete missions without enemies ever knowing it is there. Its core mission: launch secret, quiet, undetected attacks over heavily defended enemy territory to create a safer “air corridor” for less stealthy planes to operate within extremely lethal,otherwise uninhabitable airspace.

Weapons selection, navigational data and intelligence analysis are all controlled by a human pilot, operating a digital display, computer screen and fire control system in the sky.

“We have eight displays and we are able to pull up different information depending upon which buttons we push. We can see weapons, communications, flight characteristics, current atmospheric conditions, engines, electrical systems and hydraulics,” Polidar said.

Westlake Legal Group B-2_Spirit_cropped B-2 bomber 30-year anniversary: Inside a B-2 stealth attack Warrior Maven Kris Osborn fox-news/tech/topics/us-air-force fnc/tech fnc article a713ce97-8366-5e65-b381-bdbaa3a5f760

Courtesy U.S. Air Force (Courtesy U.S. Air Force)

The aircraft, which entered service in the 1980s, has flown missions over Iraq, Libya and Afghanistan. Given its ability to fly as many as 6,000 nautical miles without needing to refuel, the B-2 flew from Missouri all the way to an island off the coast of India called Diego Garcia – before launching bombing missions over Afghanistan.

While the original engineering may have come from the 1980s, many upgrades, adaptations and technological improvements have sought to keep the bomber current, relevant and ahead of evolving threats.

“We’ve been through at least 10-plus major modifications, some hardware and some software. The biggest difference in flying the B-2 today is the amount of information flow coming through the cockpit,” Col Jeffery Schreiner, 509th BW Commander and B-2 Pilot, told Warrior in an interview. Schreiner has been involved with the B-2 bomber for more than 15 years.

Managing this massively increased information flow has inspired new B-2 sensors, targeting displays, communications networks and – perhaps of greatest significance – new computer automation and processor upgrades.

“Pilots manage all the different data sources to make good, tactically relevant decisions and maintain situational awareness. Now you can make specific changes and rework sorties in flight,” Schreiner said.

AIR FORCE BUILDS FIRST B-21 RAIDER ‘TEST’ STEALTH BOMBER

The upgrades involve the re-hosting of the flight management control processors, the brains of the airplane, onto much more capable integrated processing units. This results in the laying-in of some new fiber optic cable as opposed to the mix bus cable previously being used – because original B-2 computers from the 80s could be overloaded with data in a modern war environment, Air Force officials explained.

Schreiner’s strategic view of B-2 modernization plan aligns with what leading service thinkers envision regarding future threats and needed technical adjustments, particularly regarding this need for information and networking. One prominent Air Force strategist, Retired Lt. Gen. David Deptula, Dean of the Mitchell Institute for Aerospace Studies, describes this phenomenon in terms of the need for an emerging “combat cloud.” Improved networking technology, coupled with new processing power, enables new sensors and next-generation targeting to destroy newer threats and also maintain operations in the event that one connection is damaged in war.

“The challenge is this whole notion of sharing, and treating ships, vehicles and aircraft as information nodes. This builds robustness and redundancy of the ability to share information,” Deptula told Warrior.

Extending Deptula’s reasoning, it seems apparent that the Air Force modernization approach with the B-2 has, in some ways, managed to anticipate future warfare environments.

One such example of this is the now-in-development B-2 Defensive Management System, a new sensor enabling B-2 crews to identify some dangerous enemy locations and therefore better avert advanced air defences.

An Air Force 2018 acquisition report examines some of the technical adjustments which enable these advanced sensors, stating that the DMS “upgrades the threat warning systems on board by replacing aging antennas, electronics, display system and an autorouter.”

NAVY ARMS DESTROYERS WITH NEW HIGH-POWERED LASER

The autorouter introduces what could easily be referred to as a transformative technology for several key reasons; the report describes the autoloader as something “which automates the re-planning of aircraft missions in flight.” This brings several key implications; increased automation lessens what’s often referred to as the “cognitive burden” for pilots. This frees up pilots to focus on pressing combat variables because computer automation is performing certain key procedural functions.

Secondly, by allowing for “re-planning of aircraft missions in flight,” the autorouter brings a sizeable intelligence advantage. Instead of relying upon pre-determined target information, on-board intelligence can help pilots adjust attack missions as targets change and/or relocate.. while in flight. Much of these improvements can be attributed to an ongoing effort to implement a new computer processor into the B-2, a system reported by Air Force developers to be 1,000 times faster than the existing system.

Given their 30-year life span, many may wonder how the B-2s have been maintained and remained combat ready through the decades. B-2 maintainer 2nd Lt. Bruce Vaughn from 131st Maintenance describes it as sustaining the welding, fuselage, tubing and sheet metal. Most of all, he said, it has been crucial to maintain the low-observable components and radar absorbent material. “It involves a lot of painting and materials management. You often apply it like spray paint,” Vaughn said.

Westlake Legal Group b-2-image B-2 bomber 30-year anniversary: Inside a B-2 stealth attack Warrior Maven Kris Osborn fox-news/tech/topics/us-air-force fnc/tech fnc article a713ce97-8366-5e65-b381-bdbaa3a5f760

Courtesy U.S. Air Force

Vaughn’s description of the challenges and work required to maintain stealth coating, interestingly, is supported by a 2017 essay from the Robotics Institute of Carnegie Mellon University, called “Defect-Detection Technologies for Low-Observability Aircraft Skin Coatings.” The paper makes a point to emphasize the importance, and the difficulty, of maintaining stealth materials on an aircraft.

“Due to mechanical trauma, water or other chemical trauma, natural or sunlight- or temperature-accelerated chemical breakdown, etc., an aircraft’s low observability coating peels off the substrate, flakes, blisters, cracks, or otherwise undergoes changes in texture or color or both,” the report states.

The essay also explores ways that both ultraviolet and infrared lights can be used to detect wear and tear or anomalies in the stealth coating. Computer algorithms, the paper explains, can also function as an integral part of the process.

Alongside the coating, there are a handful of additional key variables necessary to preserving stealth. The B-2 not only curved but also entirely horizontal, without vertical structures. This creates a scenario wherein a return electromagnetic ping, or radar signal, cannot obtain an actual rendering of the plane. The exterior is both smooth and curved, without visible seams binding portions of the fuselage. Weapons are carried internally, antennas and sensors are often built into parts of the fuselage itself so as to minimize detectable shapes on the aircraft. By not having protruding objects, shapes or certain vertical configurations such as fins, the bomber succeeds in blinding enemy radar, which is unable to generate enough returning electromagnetic “pings” to determine that an aircraft is there. An indispensable premise of B-2 sustainment is that the aircraft be prepared to succeed in the most “high-threat” or “contested” combat environments likely to exist.

The intent is to not only elude higher-frequency engagement radar, which allows air defenses to actually shoot an airplane, but also elude lower-frequency surveillance radar, which can simply detect an aircraft in the vicinity. Also, stealth aircraft such as the B-2 are built with an internal, or buried, engine to decrease the heat signature emerging from the exhaust. One goal of stealth aircraft thermal management is to try to make the aircraft itself somewhat aligned with the temperature of the surrounding air so as not to create a heat differential for enemy sensors to detect.

The priority, maintainers explain, is to ensure the weapons, electronics, computing and stealth properties are all continuously upgraded. Today’s B-2 could almost be described, in some ways, as an entirely different airplane with the same basic exterior – than it was upon first flight in 1989.

NEW AIR FORCE NUCLEAR-ARMED ICBMS TO DEPLOY BY 2029

The Air Force currently operates 20 B-2 bombers, with the majority of them based at Whiteman AFB in Missouri. The B-2 can reach altitudes of 50,000 feet and carry 40,000 pounds of payload, including both conventional and nuclear weapons.

One emerging nuclear weapon, now being tested and integrated onto the B-2 is the advanced B-61 Mod 12, an upgraded variant of several different nuclear bombs with integrates their functionality into one weapon. This not only decreases payload but of course multiplies attack options for pilots. For instance, a B-2 could quickly adjust from a point detonate variant of the B-61 Mod 12, to one designed with penetration capabilities, Air Force officials said. Alongside its nuclear arsenal, the B-2 will carry a wide range of conventional weapons to include precision-guided 2,000-pound Joint Direct Attack Munitions, or JDAMs, 5,000-pound JDAMs, Joint Standoff Weapons, Joint Air-to-Surface Standoff Missiles and GBU 28 5,000-pound bunker buster weapons, among others. The B-2 can also carry a 30,000-pound conventional bomb known as the Massive Ordnance Penetrator, a weapon described as a more explosive version of the Air Force GBU-28 bunker buster.

The platform is also preparing to integrate a long-range conventional air-to-ground standoff weapon called the JASSM-ER, for Joint Air-to-Surface Standoff Missile, Extended Range.

Despite flying more than 40-hour missions, pilots have no bed and no refrigerator, just two seats in a small cockpit and a small area behind them about the same width as the seat. Pilot’s food, Polidar said, needs to be non-perishable items.

“Sometimes we can bring a little blow-up mattress, put in on the floor and take a nap,” she said.

So how much longer will the B-2 fly? It is slated to fly alongside the emerging new B-21 Raider stealth bomber as it starts arriving in the mid 2020s, and ultimately retire. However, given its current trajectory and combat effectiveness, it seems entirely reasonable to speculate 2040? Perhaps 2050? We’ll see, the Air Force does not discuss this much.

Kris Osborn, Managing Editor of WARRIORMAVEN (CLICK HERE) can be reached at krisosborn.ko@gmail.com

Westlake Legal Group B-2_Spirit_cropped B-2 bomber 30-year anniversary: Inside a B-2 stealth attack Warrior Maven Kris Osborn fox-news/tech/topics/us-air-force fnc/tech fnc article a713ce97-8366-5e65-b381-bdbaa3a5f760   Westlake Legal Group B-2_Spirit_cropped B-2 bomber 30-year anniversary: Inside a B-2 stealth attack Warrior Maven Kris Osborn fox-news/tech/topics/us-air-force fnc/tech fnc article a713ce97-8366-5e65-b381-bdbaa3a5f760

Real Estate, and Personal Injury Lawyers. Contact us at: https://westlakelegal.com 

Peter Thiel says FBI, CIA should investigate if Chinese intelligence infiltrated Google: report

Billionaire tech investor Peter Thiel on Sunday called for the FBI and CIA to investigate whether Chinese intelligence had infiltrated Google, according to a report.

Thiel, who supported Trump in 2016 and Facebook board member, made the comments during a speech at the National Conservatism Conference in Washington. He said the FBI and CIA needed to ask Google three questions to determine if the tech giant had been compromised by Chinese intelligence, Axios reported.

Westlake Legal Group AP19192676211762 Peter Thiel says FBI, CIA should investigate if Chinese intelligence infiltrated Google: report fox-news/tech/topics/big-tech-backlash fox-news/tech/companies/google fox news fnc/tech fnc Bradford Betz article 14f8bbe9-734c-538e-bc90-a6a214c787fc

FILE: A Google Home Hub is displayed in New York.  (AP)

“Number one: How many foreign intelligence agencies have infiltrated your Manhattan Project for AI (artificial intelligence)?” Thiel reportedly asked. “Number two: Does Google’s senior management consider itself to have been thoroughly infiltrated by Chinese intelligence?”

Thiel then slammed Google for its decision to work with the Chinese military while refusing to renew a contract with the U.S. Department of Defense.

“Number three: Is it because they consider themselves to be so thoroughly infiltrated that they have engaged in the seemingly treasonous decision to work with the Chinese military and not with the US military,” Thiel said.

OK GOOGLE, ARE YOU LISTENING? TECH GIANT’S SMART SPEAKERS EAVESDROP ON PRIVATE CONVERSATIONS, INVESTIGATION FINDS

Google has faced criticism over its work on a censored search engine – “Project Dragonfly” – that would allow it to return to China after leaving in 2010 over human rights concerns. The company dropped the project after members of the company’s privacy team raised complaints.

GET THE FOX NEWS APP

Other reports said that Google decided not to renew its contract for Project Maven – a controversial military program that uses artificial intelligence to improve drone targeting – which expired earlier this year.

Google did not immediately respond to Fox News’ request for comment.

Fox News’ Louis Casiano contributed to this report.

Westlake Legal Group AP19192676211762 Peter Thiel says FBI, CIA should investigate if Chinese intelligence infiltrated Google: report fox-news/tech/topics/big-tech-backlash fox-news/tech/companies/google fox news fnc/tech fnc Bradford Betz article 14f8bbe9-734c-538e-bc90-a6a214c787fc   Westlake Legal Group AP19192676211762 Peter Thiel says FBI, CIA should investigate if Chinese intelligence infiltrated Google: report fox-news/tech/topics/big-tech-backlash fox-news/tech/companies/google fox news fnc/tech fnc Bradford Betz article 14f8bbe9-734c-538e-bc90-a6a214c787fc

Real Estate, and Personal Injury Lawyers. Contact us at: https://westlakelegal.com 

Peter Thiel says FBI, CIA should investigate if Chinese intelligence infiltrated Google: report

Billionaire tech investor Peter Thiel on Sunday called for the FBI and CIA to investigate whether Chinese intelligence had infiltrated Google, according to a report.

Thiel, who supported Trump in 2016 and Facebook board member, made the comments during a speech at the National Conservatism Conference in Washington. He said the FBI and CIA needed to ask Google three questions to determine if the tech giant had been compromised by Chinese intelligence, Axios reported.

Westlake Legal Group AP19192676211762 Peter Thiel says FBI, CIA should investigate if Chinese intelligence infiltrated Google: report fox-news/tech/topics/big-tech-backlash fox-news/tech/companies/google fox news fnc/tech fnc Bradford Betz article 14f8bbe9-734c-538e-bc90-a6a214c787fc

FILE: A Google Home Hub is displayed in New York.  (AP)

“Number one: How many foreign intelligence agencies have infiltrated your Manhattan Project for AI (artificial intelligence)?” Thiel reportedly asked. “Number two: Does Google’s senior management consider itself to have been thoroughly infiltrated by Chinese intelligence?”

Thiel then slammed Google for its decision to work with the Chinese military while refusing to renew a contract with the U.S. Department of Defense.

“Number three: Is it because they consider themselves to be so thoroughly infiltrated that they have engaged in the seemingly treasonous decision to work with the Chinese military and not with the US military,” Thiel said.

OK GOOGLE, ARE YOU LISTENING? TECH GIANT’S SMART SPEAKERS EAVESDROP ON PRIVATE CONVERSATIONS, INVESTIGATION FINDS

Google has faced criticism over its work on a censored search engine – “Project Dragonfly” – that would allow it to return to China after leaving in 2010 over human rights concerns. The company dropped the project after members of the company’s privacy team raised complaints.

GET THE FOX NEWS APP

Other reports said that Google decided not to renew its contract for Project Maven – a controversial military program that uses artificial intelligence to improve drone targeting – which expired earlier this year.

Google did not immediately respond to Fox News’ request for comment.

Fox News’ Louis Casiano contributed to this report.

Westlake Legal Group AP19192676211762 Peter Thiel says FBI, CIA should investigate if Chinese intelligence infiltrated Google: report fox-news/tech/topics/big-tech-backlash fox-news/tech/companies/google fox news fnc/tech fnc Bradford Betz article 14f8bbe9-734c-538e-bc90-a6a214c787fc   Westlake Legal Group AP19192676211762 Peter Thiel says FBI, CIA should investigate if Chinese intelligence infiltrated Google: report fox-news/tech/topics/big-tech-backlash fox-news/tech/companies/google fox news fnc/tech fnc Bradford Betz article 14f8bbe9-734c-538e-bc90-a6a214c787fc

Real Estate, and Personal Injury Lawyers. Contact us at: https://westlakelegal.com 

7 digital privacy tricks you’ll wish you knew before now

Westlake Legal Group amazon-alexa-getty-images 7 digital privacy tricks you’ll wish you knew before now The Kim Komando Show Kim Komando fox-news/tech/topics/privacy fnc/tech fnc article 450e9d9e-f037-5c67-b7b6-8dffb6c6a55a

We surround ourselves with devices. Our cars respond to us. Our smart TVs listen to us. Every camera in every tablet and laptop is a potential spying device. Even when we’re alone, miles from the nearest human, our phones are gateways to the universe, just waiting to share everything it knows.

To protect our privacy and stay safe from hackers, we have to remain vigilant. That’s why I recommend people use a VPN. If you’re not sure how they work, watch this quick YouTube tip on my channel.

There are many other tricks for keeping our personal data away from snoops and hackers. Most of them have to do with changing your default settings, which you should assume are not set in your favor. Other techniques might require a little more work, but you’ll probably find yourself grateful that you took the extra steps.

Look at each trick, and if you want more details, I have provided a link to the step-by-step instructions on my site.

1. Protect your Airdrop function

For Mac users, AirDrop is an incredibly convenient way to share large files with nearby devices. It’s so convenient that trolls can send you all kinds of unwanted files, filling your hard drive with junk – or worse. This is especially common in airports, malls or other crowded places where gadgets are being used in the same area at the same time.

To protect yourself, you’ll want to change the default AirDrop settings. You can restrict AirDrop access to people in your contacts. You can also turn it off altogether. You can even decline the files that people send you.

Tap or click here to learn exactly how to modify your AirDrop settings.

2. Remove yourself from Family Tree Now

The original purpose of Family Tree Now was to connect people to their distant relatives, thanks to comprehensive genealogical information. The site started raising eyebrows when people discovered their home addresses listed, along with directions for how to get there. Strangers may also lookup your telephone number and other personal details.

Most people leave a digital footprint. But Family Tree Now feels particularly invasive, and luckily, there’s something you can do about it: there’s a special Opt-Out Page, and if you follow the instructions, Family Tree Now should be able to process your request within 48 hours.

Tap or click here to learn how to precisely delete yourself from this scary site.

3. Wipe the computer in your car

Your car knows a great deal about you, and if your car connects to your phone, it may contain a treasure trove of contacts, preferences, and navigational data that you’ve never even thought about. This is a problem if you’re selling or trading in your vehicle; the smarter your car, the more likely it is that vulnerable information will fall into the wrong hands.

Some of this data should be obvious such as old apps, but others less so: You may have garage doors codes programmed into your vehicle, which could prove very valuable to a cyber-criminal with a penchant for burglary.

Tap or click here for five ways to clear your data from your car.

4.  Protect your privacy on Nextdoor

Nextdoor is a terrific site for keeping up with neighborhood news, including changes to services and an uptick in street crimes. It’s an easy way for neighbors to contact each other, make announcements, or just share useful information.

But Nextdoor isn’t very well monitored, and when arguments ensue – as often happens between neighbors – things can get heated, quickly. Because you literally live near the people you’re communicating with, a bad disagreement can get personal, and many users report bullying tactics. You may avoid Nextdoor for this very reason, but the best tactic is to make sure your street address is not listed. That will prevent people from quickly identifying where you are on the block and venting in person.

Tap or click here for more tips to protecting your privacy on Nextdoor.

5. Vet links before you click on them

Clicking on a link is almost as natural as breathing, which is one reason viruses and ransomware spread so quickly. A credible-looking link can cause a lot of problems for your computer; in fact, you can wreck an entire network, including large businesses, by following the wrong link.

If you receive a link and you’ve done everything you can to confirm it’s legit – including googling the sender, the web address and any other contextual information – you can also vet the link through services like ScanURL. This website will determine the owner of the link, whether it’s been reported and a final recommendation for visiting.

Tap or click here for other services that will help you determine the safety of a given link.

6. Wrap your car keys in aluminum foil

Like tinfoil hats, wrapping your car keys in tinfoil might sound like a conspiracy theory. In this case, it’s not; cyber-criminals often can remotely decrypt your key, which in turn enables them to break into your car. Think about it: no forced entry, no stolen purse, no broken glass, just a vanished car without any explanation.

Data thieves might also be able to intercept this data by idling outside your house while you sleep. How do you protect your wireless lock then? There are a few interesting ways, one of which involves a regular old microwave.

Tap or click here for other methods to protect your wireless car key.

7. Stop Alexa, Siri and Google Home from listening to you

This trick is a tough one because virtual assistants are designed to listen to your every word. Without hearing a “wake phrase,” they won’t even function the way they were intended to. So unless you want your Echo or Home to turn into a regular Bluetooth speaker system, your best bet is to keep them turned on, or just avoid the smart home speaker revolution altogether.

That said, you can stop all these devices from recording your voice. After all, developers end up compiling all those recordings and storing them for their own purposes, and you have every right to delete those files. The purpose of those recordings is pretty benign; developers claim that they want to help refine the software. But if you’re satisfied with how the gadgets operated when they came out of the box (as many of us are), you can delete those records by digging into your settings – and end the recordings for good.

Tap or click here for six ways to stop your devices from recording you.

What digital lifestyle questions do you have? Call Kim’s national radio show and tap or click here to find it on your local radio station. You can listen to or watch the Kim Komando Show on your phone, tablet, television or computer. Or tap or click here for Kim’s free podcasts.

Copyright 2019, WestStar Multimedia Entertainment. All rights reserved.

Learn about all the latest technology on the Kim Komando Show, the nation’s largest weekend radio talk show. Kim takes calls and dispenses advice on today’s digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips, free newsletters and more, visit her website at Komando.com.

Westlake Legal Group amazon-alexa-getty-images 7 digital privacy tricks you’ll wish you knew before now The Kim Komando Show Kim Komando fox-news/tech/topics/privacy fnc/tech fnc article 450e9d9e-f037-5c67-b7b6-8dffb6c6a55a   Westlake Legal Group amazon-alexa-getty-images 7 digital privacy tricks you’ll wish you knew before now The Kim Komando Show Kim Komando fox-news/tech/topics/privacy fnc/tech fnc article 450e9d9e-f037-5c67-b7b6-8dffb6c6a55a

Real Estate, and Personal Injury Lawyers. Contact us at: https://westlakelegal.com 

Doxing defenses, games for retirees, breaking up with Google, and more: Tech Q&A

Westlake Legal Group ContentBroker_contentid-f8c02a4a837f443293fbe4a891581e6d Doxing defenses, games for retirees, breaking up with Google, and more: Tech Q&A The Kim Komando Show Kim Komando fox-news/tech/companies/google fox-news/tech/companies/amazon fox-news/tech fnc/tech fnc c1074dbe-0184-52d5-a1d9-e2d628568ed5 article

Google Breakup

Q: I hate that Google tracks me. Are there ways to have a Google-free online life?

A: There are, but you have to jump through a few hoops to get to nirvana. One way to protect your personal information while browsing online is to download Tor, which encrypts your every movement and grants you access to the Dark Web. That may be overkill, which is why you need to first try free and easy to use browsers that offer a privacy-focused alternative to Google. Tap or click here for alternatives to Google that don’t track you.

Stop Doxing

Q: My sister is the victim of doxing. It’s so upsetting. What can I do to make sure it does not happen to me?

A: I’m so sorry your sister had to go through that, and I hope the damage was minimal. This is the downside of our hyper-connected age: we leave a much bigger paper trail on the internet then we could possibly realize, and a motivated analyst can put those particles of information together and use them against us. This isn’t necessarily the tool of a seasoned cyber-criminal; much of this data is publicly available, and it just takes a little sleuthing to expose your most uncomfortable secrets. Tap or click here to protect yourself from doxing.

Economical Prescription Drugs

Q: Is it safe to buy prescriptions online? I am worried that online pills are not produced the right way.

A: As you may know, I live in Arizona. For many folks around here, hopping the border to Mexico to refill on generic pharmaceuticals is a matter of routine. Not everyone has the benefit of a nearby international border, nor does everyone feel comfortable waltzing into a dubious-looking farmacía. Still, cheap alternatives are out there, and the internet provides many safe and legitimate ways to save on your prescriptions, such as GoodRX. Each service or app has its own specialty, and you’ll benefit from realistic expectations. Tap or click here for three little-known ways to save money on prescriptions.

Gaming for Elders

Q: I’m 58. I used to love games like Doom. I tried Fortnite and it’s confusing. Are there any good games for us old folks?

A: Many critics deride video and computer games as violent, abusive garbage – and in many cases, I tend to agree. Other games may appeal to mature audiences (at least in spirit) but prove too complicated to enjoy. That’s why puzzles, trivia, and timeless board games like Backgammon can be great; they keep minds sharp, and they often encourage interaction with real-life players around the globe. Systems like Wii claim to get sedentary users back into shape, and programs like Flight Simulator Xtreme are both thrilling and instructive. Tap or click here for the best games for people over 55

Audit Amazon Purchases

Q: My wife spends too much money on Amazon. She uses multiple credit cards to hide her purchases. Can I get a total of all her orders?

A: Before I go into the technical details, I urge you to stage an intervention because what you’re describing sounds like addiction, and there may be more at stake than an outstanding credit card debt. Okay, that said: if you share an Amazon account and have full access, you can review every purchase anyone has ever made. This will be trickier if she has her own account, but Amazon makes it very easy to revisit your complete transaction history. This way, you can tally up exactly how much was spent (and on what) and you will have hard evidence to present if you decide to intervene. Tap or click here to download your entire Amazon purchase history.

What digital lifestyle questions do you have? Call Kim’s national radio show and tap or click here to find it on your local radio station. You can listen to or watch the Kim Komando Show on your phone, tablet, television or computer. Or tap or click here for Kim’s free podcasts.

Copyright 2019, WestStar Multimedia Entertainment. All rights reserved.

Learn about all the latest technology on the Kim Komando Show, the nation’s largest weekend radio talk show. Kim takes calls and dispenses advice on today’s digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips, free newsletters and more, visit her website at Komando.com.

Westlake Legal Group ContentBroker_contentid-f8c02a4a837f443293fbe4a891581e6d Doxing defenses, games for retirees, breaking up with Google, and more: Tech Q&A The Kim Komando Show Kim Komando fox-news/tech/companies/google fox-news/tech/companies/amazon fox-news/tech fnc/tech fnc c1074dbe-0184-52d5-a1d9-e2d628568ed5 article   Westlake Legal Group ContentBroker_contentid-f8c02a4a837f443293fbe4a891581e6d Doxing defenses, games for retirees, breaking up with Google, and more: Tech Q&A The Kim Komando Show Kim Komando fox-news/tech/companies/google fox-news/tech/companies/amazon fox-news/tech fnc/tech fnc c1074dbe-0184-52d5-a1d9-e2d628568ed5 article

Real Estate, and Personal Injury Lawyers. Contact us at: https://westlakelegal.com