P1 / MOBILE P2 / NANOSTRUCTURED P3 / SCREENLESS P4 / THE REAL 4G

COLLABORATION CARBON COMPOSITES DISPLAY Such breakthroughs could The app synchronized his New techniques to Holographic colour video give networks some 30 times Recyclable contributions with everyone nanostructure carbon fibres display with the resolution as much capacity as LTE- else’s for novel composites of a standard TV. Advanced. Thermoset Plastics Called poly(hexahydrotriazine)s, or PHTs, these can be dissolved in strong acid, A new kind of plastic to cut landfill waste breaking apart the polymer chains into component monomers that can then be NEW HORIZON COLLEGE OF ENGINEERING Plastics are divided into thermoplastics and reassembled into new products. Like thermoset plastics. The former can be heated and traditional unrecyclable thermosets, these shaped many times and are ubiquitous in the new structures are rigid, resistant to heat ADVANCED CONTEMPORARY and tough, with the same potential modern world, comprising everything from applications as their unrecyclable children’s toys to lavatory seats. Because they can forerunners. EMERGING TECHNOLOGY be melted down and reshaped, thermoplastics are Although no recycling is 100 percent generally recyclable. Thermoset plastics, however, efficient, this innovation—if widely can only be heated and shaped once, after which deployed—should speed up the move DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING ACE / Q1 / SEP 2016 molecular changes mean they are “cured,” impossible to recycle. As a result, most thermoset toward a circular economy, with a big reduction in landfill waste from plastics. We retaining their shape and strength even when polymers end up as landfill. Given the ultimate expect recyclable thermoset polymers to subjected to intense heat and pressure. objective of sustainability, there has long been a replace unrecyclable thermosets within five Due to this durability thermoset plastics are a vital pressing need for recyclability in thermoset years, and to be ubiquitous in newly part of our modern world. They are used in plastics. manufactured goods by 2025. everything from mobile phones and circuit boards In 2014 critical advances were made in this area to the aerospace industry. But the same with the publication of a landmark paper in characteristics that have made them essential in Science announcing the discovery of new classes Ultra Private modern manufacturing also make them of thermosetting polymers that are recyclable. impossible to recycle. As a result, most thermoset Called poly(hexahydrotriazine)s, or PHTs, these Smartphones With polymers end up as landfill. Given the ultimate can be dissolved in strong acid, breaking apart the objective of sustainability, there has long been a polymer chains into component monomers that Security And Privacy pressing need for recyclability in thermoset can then be reassembled into new products. Like plastics. traditional unrecyclable thermosets, these new Of Snowden Era structures are rigid, resistant to heat and tough, with the same potential applications as their unrecyclable forerunners. On January 21 a text message flashed on phones held by the protesters Zimmermann always wanted to take widespread encryption to the next level: thronging Kiev’s Independence Square. Ukraine’s president, Viktor Yanukovych, secure telephony. Until the past few years, however, voice transmissions did not was then still clinging to power and brutalizing opponents. The message—from generally take the digital form required by cryptographic technologies. In the the number 111—read: “Dear subscriber, you are registered as a participant in a 1990s he’d built a prototype, but it required using modems tethered to PCs. mass disturbance.” Widely presumed to have been sent from Yanukovych’s “That product was never going to get any traction,” he says. Today, telephone security apparatus to all phones in the protest zone, the message was a stark reminder of how mobile phones can be used for surveillance. companies and carriers do encrypt calls—but they hold the crypto keys in their Soon after, a Ukrainian man walked into a nondescript office in National Harbor, servers, and “phone companies have historically been very coöperative with Maryland, and sought help from a man named Phil Zimmermann. wiretapping,” he says. Zimmermann’s protocols instead kept the keys only at endpoints—preventing the carriers and even his own servers from decrypting Zimmermann is a cryptologist. His company, Silent Circle, encrypts voice calls, the content of a call. text messages, and any file attachments. If you use Silent Circle, your calls to

other users are sent through the company’s servers and decrypted on the other These days, almost all telephony is digital—not just obvious forms like Skype, but phone. The service won’t stop the delivery of ominous messages in range of cellular and landlines, too. So when a former U.S. Navy SEAL, Mike Janke, certain base stations. But it can block eavesdropping and prevent the snooper Theseapproached days, almostZimmermann all telephony in 2011 is withdigital an— ideanot forjust providing obvious forms a service like toSkype, help but from knowing the number of the person you are calling or texting. Soon, access cellularU.S. military and landlines, members too. make So secure when acalls former home, U.S. he Navy was SEAL,game. Mike They Janke, joined with codes for Silent Circle were making their way to protest organizers in the heart approachedJon Callas, creator Zimmermann of Apple’s in 2011whole with-disk an encryption, idea for providing to found a Silent service Circle. to help ADVISORY COMMITTEE STUDENT EDITORS of Kiev. U.S. military ismembers an amalgamation make secure of technologies. calls home, he Silent was Circlegame. provides They joined the with

Jonencrypted Callas, creatorvoice and of textApple’s services; whole the-disk device encryption, is being to made found by Silent Geeksphone, Circle. a Dr. Prashant S R Prabhat Kumar Prasad Documents brought to light by former U.S. National Security Agency contractor Spanish company that specializes in phones that run open-source operating Dean Academics Rahul D Shanbhog Edward Snowden suggest that the NSA gathers huge amounts of information systems. Together they created •PrivatOS, which gives more control over what Prof & Head Dept of CSE from cloud computing platforms and wireless carriers. Modern smartphones and the apps running on them are engineered to collect and disseminate enormous data apps can see, encrypts data stored on the phone, and allows you to get Prof Anjana Sharma amounts of user data—such as location, Web browsing histories, search terms, wireless security updates directly from Blackphone, rather than relying on Dept of CSE and contact lists. By summer Zimmermann will be delivering a new way to fight carriers. While the phone is resistant to everyday threats like hacking and back: a highly secure smartphone, called Blackphone which uses Zimmermann’s snooping by data brokers, even the company concedes that it’s not NSA-proof. encryption tools and adds other protections. It runs a special version of the

Android —PrivatOS—that blocks many of the ways phones leak

data about your activities. While custom security phones have long been in the

hands of military and government leaders, this effort may signal a shift toward mass-market phones that are far more private and secure.

Project Loon ITECH UPDATE Billions of people could get online for the first time thanks to helium balloons that Google will soon send over many places cell towers don’t reach. Google has launched hundreds of these balloons into the sky, lofted by helium, which is 15 meters across, that resemble giant white pumpkins. At this moment, a couple of dozen LUMUS LENS, A NEW AGE WEARLESS float over the Southern Hemisphere at an LENS TECHNOLOGY Lumus is the name for the new age lens altitude of around 20 kilometers, in the rarely technology. Its path breaking new visited stratosphere—nearly twice the height technology in the visual technology area. of commercial airplanes. Each balloon it has a 720p near HD quality augmented supports a boxy gondola stuffed with solar- Project Loon aims to change the economics of reality display. This display is embedded powered electronics. They make a radio link “ into a this glass which would be almost to a telecommunications network on the Internet access. impossible to sight from a distance or even from proximity. Its possible to watch ground and beam down high-speed cellular ” movies and videos like on any other Internet coverage to smartphones and other screen. devices. It’s known as Project Loon, a name It is odd for a large public company to build out “HARMLESS SCIENCE EXPERIMENT.” That’s what chosen for its association with both flight and infrastructure aimed at helping the world’s was written on the boxes carried by the balloons insanity. poorest people. But in addition to Google’s that the secretive Google X lab began to launch Google says these balloons can deliver professed desires to help the world, the over California’s Central Valley in 2012, along widespread economic and social benefits by economics of ad-•supported Web businesses give with a phone number and the promise of a bringing Internet access to the 60 percent of the company other reasons to think big. It’s hard reward for safe return. Inside the boxes was a the world’s people who don’t have it. Many of to find new customers in Internet markets such modified office Wi-Fi router. The balloons were those 4.3 billion people live in rural places as the United States. Getting billions more made by two seamsters hired from the fashion where telecommunications companies people online would provide a valuable new industry, from supplies bought at hardware haven’t found it worthwhile to build cell supply of eyeballs and personal data for ad stores. Those working on Project Loon are towers or other infrastructure. targeting. confident the public good will be served. Lumus comes with inclusion of Android OS and Camera. This makes it even more Precise Genetic-Engineering useful and is better than Google Glass or any other tech in this sector. It reswponds Techniques that genetically modifying organisms to hand gestures with which one can using this technique is no riskier than control the device and its display. This NETWORKING A breakthrough offers better crops with modifying them using conventional In January, programmers in Toronto began testing a Up to date, more than 200,000 people lens tech is very useful when user is busy less controversy breeding. Whereas agrobacterium is system for trading genetic information with other have already had their genomes sequenced or away. and this continues to rise. However, the Conventional genetic engineering has useful, more precise and varied genome- hospitals. These facilities, in locations including It has Stereoscopic image enabling 3D challenge in genomics is that a great deal of long caused controversy. Now new video and gaming. Allows discreet editing techniques have been developed Miami, Baltimore, and Cambridge, U.K., also treat the above life-saving information, though techniques are emerging that allow us to in recent years. viewing and hands free flow of critical ACCESSABILITY children with so-called •Mendelian disorders, which already collected, is still inaccessible. directly “edit” the genetic code of plants to These include ZFNs, TALENs and, more data, keeping u connected no matter what are caused by a rare mutation in a single gene. The make them, for example, more nutritious recently, the CRISPR–Cas9 system, This could ultimately lead to discoveries you’re doing. Watching on the go while or better able to cope with a changing which evolved in bacteria as a defence system, called MatchMaker Exchange, represents about the genetics of common and rare seeing what’s going on around you – diseases. To complicate this matter more, climate; we believe the benefits, and the mechanism against viruses. CRISPR– something new: a way to automate the comparison Situational Awareness. No fatigue or we also have to consider all of the social precision in “editing,” could allay the dizziness because of open peripheral Cas9 uses an RNA molecule to target of DNA from sick people around the world. But and legal concerns when it comes to privacy concerns, leading to more widespread vision and proprietary alignment methods DNA, cutting to a known, user-selected pressure is building to use technology to study many, rules. DNA data is protected because it can adoption. sequence in the target genome. This identify individuals, like a fingerprint—and and procedures. As lens is this, the AWARENESS many genomes at once and begin to compare that Currently, the genetic engineering of capability can disable an unwanted gene medical records are private too. wearable is light and comfortable to use genetic information with medical records. That is crops relies on the bacterium or modify it in a way that is functionally in gadgets. Knowing that trafficking DNA across the agrobacterium tumefaciens to transfer because scientists think they’ll need to sort through a indistinguishable from a natural mutation. Web could be a target for “Hacking your desired DNA into the target genome. The Using “homologous recombination,” million genomes or more to solve cases. genetic code”, would you be willing to technique is proved and reliable and, CRISPR can also be used to insert new share your genomic data in the hope of despite widespread public fears, there is DNA sequences or even whole genes saving? a consensus in the scientific community into the genome in a precise way. that genetically modifying organisms using this technique is no riskier than