Spiderbot moves with four magnetic grapplers that it can launch, detach, and aim according to it’s path planning algorithm. While the robot is definitely not a final product and is quite a bit away from moving with the same grace and speed as our friendly neighborhood Spider-Man, it is definitely one of the more interesting locomotion experiments out there. The video has some nice slow motion footage of the main mechanisms as well as screen captures of the path planning.
While we were away, we missed the story about the giant mechanical spider in Liverpool. That spider has come to life, and you can watch the video courtesy of the BBC.
Named La Princesse, she an art project designed to build tourism and boost the economy. Developed by french company La Machine, she looks amazing. It looks as though it takes 9 people to pilot her, possibly another running the crane she’s suspended from. Watch the video and see her reach out and tap an onlooker’s umbrella with one of her legs.
When an organization’s network grows to a certain size, its difficult to keep track of every single piece of sensitive information like credit card numbers or social security numbers. In order to find and secure this data, companies often turn to data loss prevention (DLP) services. This is not a viable option for many organizations, though, as DLP services can often be expensive and time-consuming to deploy.
Such organizations are not entirely without options: a recent article on Dark Reading lists several DLP tools authored by teams from various universities, all free to download and use. Programs like The University of Texas at Austin’s Sensitive Number Finder and Virginia Tech’s Find_SSN were designed to find pieces of data on computers and servers formatted in ways typical to sensitive information (xxx-xx-xxxx for SSNs, for example). This approach can often lead to false positives, so some measure of human control is required. They are also incapable of scanning application servers or other forms of data in transit. Cornell’s Spider can scan various application server types using different protocols. When used in conjunction, all of these apps can help secure your data without the expense of outsourcing the job.