fbpx
Connect with us

The Conversation

What is USB-C? A computer engineer explains the one device connector to rule them all

Published

on

What is USB-C? A computer engineer explains the one device connector to rule them all

With pressure from the European Union, Apple has thrown in the towel on its Lightning connector, left, in favor of the standard USB-C, right.
Frederic J. Brown/AFP via Getty Images

Shreyas Sen, Purdue University

Apple announced on Sept. 12, 2023, that it plans to adopt the USB-C connector for all four new iPhone 15 models, helping USB-C become the connector of choice of the electronics industry, nine years after its debut. The move puts Apple in compliance with European Union law requiring a single connector type for consumer devices.

USB-C is a small, versatile connector for mobile and portable devices like laptops, tablets and smartphones. It transfers data at high speeds, transmits and delivers power to charge devices' batteries. USB stands for Universal Serial Bus. The C refers to the third type, types A and B.

The USB Implementers Forum, a consortium of over 1,000 companies that promote and USB technology, developed the USB-C connector to replace the older USB connectors as well as other types of ports like HDMI, DisplayPort and VGA. The aim is to create a single, universal connector for a wide range of devices.

The key features and of USB-C include a reversible connector that you can insert in either orientation. It also allows some cables to have the same connector on both ends for connecting between devices and connecting devices to chargers, unlike most earlier USB and Lightning cables.

Advertisement

USB-C's widespread adoption in the electronics industry is likely to to a universal standard that reduces the need for multiple types of cables and adapters. Also, its slim and compact shape allows manufacturers to make thinner and lighter devices.

USB-C refers to the physical connector. Connectors use a variety of data transfer protocols – sets of rules for formatting and handling data – such as the USB and Thunderbolt protocols. USB-C supports USB and Thunderbolt, which makes it suitable for connecting laptops, smartphones, tablets, monitors, docking stations and many other devices.

The latest USB protocol, version 4, provides a data transfer rate of up to 40 gigabits per second, depending on the rating of the cable. The latest Thunderbolt, also on version 4, supports up to 40 gigabits-per-second data transfer and 100 watts charging. The newly announced Thunderbolt 5 will support up to 80 and 120 gigabits-per-second transfer and 140 to 240 watts power transfer over a USB-C connector.

What Apple's shift to USB-C means.

Why USB-C matters

Due to the fragmented nature of technology evolution, computer users a decade ago were struggling with too many connectors: USB for data; power cables for charging; HDMI, DisplayPort or VGA for video; and Ethernet for internet. This called for an industrywide effort to convergence on an all-purpose connector.

Advertisement

Since its introduction in 2014, USB-C has gained widespread popularity and has already become the connector of choice for most non-Apple devices. Apple converted the iPad Pro to USB-C in 2018 and now is doing the same for the best selling Apple device, the iPhone. Some market forecasts suggest there will be close to 4 USB-C connector sales by 2025 and 19 billion by 2033.

Thanks to the industrywide adoption of USB-C, consumers soon won't have to ask “Is this the right connector?” when they reach for a cable to charge or sync their portable devices. And if you're an iPhone user and find yourself with a new model, you can recycle your no-longer-needed Lightning cables by, for example, bringing them to an Apple store.The Conversation

Shreyas Sen, Elmore Associate Professor of Electrical and Computer Engineering, Purdue University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Advertisement

The Conversation

Chandrayaan-3’s measurements of sulfur open the doors for lunar science and exploration

Published

on

Chandrayaan-3's measurements of sulfur open the doors for lunar science and exploration

Chandrayaan-3's Pragyan rover has traveled 328 feet.
(100 meters) and measured the chemistry of the lunar soil.
ISRO

Jeffrey Gillis-Davis, Arts & Sciences at Washington University in St. Louis

In an exciting milestone for lunar scientists around the globe, India's Chandrayaan-3 lander touched down 375 miles (600 km) from the south pole of the Moon on Aug. 23, 2023.

In just under 14 Earth days, Chandrayaan-3 provided scientists with valuable new data and further inspiration to explore the Moon. And the Indian Space Research Organization has shared these initial results with the world.

While the data from Chandrayaan-3's rover, named Pragyan, or “wisdom” in Sanskrit, showed the lunar soil contains expected elements such as iron, titanium, aluminum and calcium, it also showed an unexpected surprise – sulfur.

India's lunar rover Pragyan rolls out of the lander and onto the surface.

Planetary scientists like me have known that sulfur exists in lunar rocks and soils, but only at a very low concentration. These new measurements imply there may be a higher sulfur concentration than anticipated.

Advertisement

Pragyan has two instruments that analyze the elemental composition of the soil – an alpha particle X-ray spectrometer and a laser-induced breakdown spectrometer, or LIBS for short. Both of these instruments measured sulfur in the soil near the landing site.

Sulfur in soils near the Moon's poles might help astronauts off the one day, making these measurements an example of science that enables exploration.

Geology of the Moon

There are two main rock types on the Moon's surface – dark volcanic rock and the brighter highland rock. The brightness difference between these two materials forms the familiar “man in the moon” face or “rabbit picking rice” image to the naked eye.

The Moon, with the dark regions outlined in red, showing a face with two ovals for eyes and two shapes for the nose and mouth.
The dark regions of the Moon have dark volcanic soil, while the brighter regions have highland soil.
Avrand6/Wikimedia Commons, CC BY-SA

Scientists measuring lunar rock and soil compositions in labs on Earth have found that materials from the dark volcanic plains tend to have more sulfur than the brighter highlands material.

Sulfur mainly comes from volcanic activity. Rocks deep in the Moon contain sulfur, and when these rocks melt, the sulfur becomes part of the magma. When the melted rock nears the surface, most of the sulfur in the magma becomes a gas that is released along with water vapor and carbon dioxide.

Advertisement

Some of the sulfur does stay in the magma and is retained within the rock after it cools. This process explains why sulfur is primarily associated with the Moon's dark volcanic rocks.

Chandrayaan-3's measurements of sulfur in soils are the first to occur on the Moon. The exact amount of sulfur cannot be determined until the data calibration is completed.

The uncalibrated data collected by the LIBS instrument on Pragyan suggests that the Moon's highland soils near the poles might have a higher sulfur concentration than highland soils from the equator and possibly even higher than the dark volcanic soils.

These initial results give planetary scientists like me who study the Moon new insights into how it works as a geologic system. But we'll still have to wait and see if the fully calibrated data from the Chandrayaan-3 team confirms an elevated sulfur concentration.

Advertisement

Atmospheric sulfur formation

The measurement of sulfur is interesting to scientists for at least two reasons. First, these findings indicate that the highland soils at the lunar poles could have fundamentally different compositions, with highland soils at the lunar equatorial regions. This compositional difference likely from the different environmental conditions between the two regions – the poles get less direct sunlight.

Second, these results suggest that there's somehow more sulfur in the polar regions. Sulfur concentrated here could have formed from the exceedingly thin lunar atmosphere.

The polar regions of the Moon less direct sunlight and, as a result, experience extremely low temperatures compared with the rest of the Moon. If the surface temperature falls, below -73 degrees C (-99 degrees F), then sulfur from the lunar atmosphere could collect on the surface in solid form – like frost on a window.

Sulfur at the poles could also have originated from ancient volcanic eruptions occurring on the lunar surface, or from meteorites containing sulfur that struck the surface and vaporized on impact.

Advertisement

Lunar sulfur as a resource

For long-lasting missions, many agencies have thought about building some sort of base on the Moon. Astronauts and robots could travel from the south pole base to collect, process, store and use naturally occurring materials like sulfur on the Moon – a concept called in-situ resource utilization.

In-situ resource utilization means fewer trips back to Earth to get supplies and more time and energy spent exploring. Using sulfur as a resource, astronauts could build solar cells and batteries that use sulfur, mix up sulfur-based fertilizer and make sulfur-based concrete for construction.

Sulfur-based concrete actually has several compared with the concrete normally used in building projects on Earth.

For one, sulfur-based concrete hardens and becomes strong within hours rather than weeks, and it's more resistant to wear. It also doesn't require water in the mixture, so astronauts could save their valuable water for drinking, crafting breathable oxygen and making rocket fuel.

Advertisement
The gray surface of the Moon as seen from above, with a box showing the rover's location in the center.
The Chandrayaan-3 lander, pictured as a bright white spot in the center of the box. The box is 1,108 feet (338 meters) wide.
NASA/GSFC/Arizona

While seven missions are currently operating on or around the Moon, the lunar south pole region hasn't been studied from the surface before, so Pragyan's new measurements will help planetary scientists understand the geologic history of the Moon. It'll also allow lunar scientists like me to ask new questions about how the Moon formed and evolved.

For now, the scientists at Indian Space Research Organization are busy processing and calibrating the data. On the lunar surface, Chandrayaan-3 is hibernating through the two--long lunar night, where temperatures will drop to -184 degrees F (-120 degrees C). The night will last until September 22.

There's no guarantee that the lander component of Chandrayaan-3, called Vikram, or Pragyan will survive the extremely low temperatures, but should Pragyan awaken, scientists can expect more valuable measurements.The Conversation

Jeffrey Gillis-Davis, Research Professor of Physics, Arts & Sciences at Washington University in St. Louis

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Advertisement
Continue Reading

The Conversation

Spyware can infect your phone or computer via the ads you see online – report

Published

on

Spyware can infect your phone or computer via the ads you see online – report

A new type of spyware means those online ads could go from annoying to menacing.
AP Photo/Julio Cortez

Claire Seungeun Lee, UMass Lowell

Each day, you digital traces of what you did, where you went, who you communicated with, what you bought, what you're thinking of buying, and much more. This mass of data serves as a library of clues for personalized ads, which are sent to you by a sophisticated network – an automated marketplace of advertisers, publishers and brokers that operates at lightning speed.

The ad networks are designed to shield your identity, but companies and governments are able to combine that information with other data, particularly phone location, to identify you and track your movements and online activity. More invasive yet is spyware – malicious software that a agent, private investigator or criminal installs on someone's phone or computer without their knowledge or consent. Spyware lets the user see the contents of the target's device, calls, texts, email and voicemail. Some forms of spyware can take control of a phone, including turning on its microphone and camera.

Now, according to an investigative report by the Israeli newspaper Haaretz, an Israeli technology company called Insanet has developed the means of delivering spyware via online ad networks, turning some targeted ads into Trojan horses. According to the , there's no defense against the spyware, and the Israeli government has given Insanet approval to sell the technology.

Sneaking in unseen

Insanet's spyware, Sherlock, is not the first spyware that can be installed on a phone without the need to trick the phone's owner into clicking on a malicious link or downloading a malicious file. NSO's iPhone-hacking Pegasus, for instance, is one of the most controversial spyware tools to emerge in the past five years.

Advertisement

Pegasus relies on vulnerabilities in Apple's iOS, the iPhone operating system, to infiltrate a phone undetected. Apple issued a security update for the latest vulnerability on Sept. 7, 2023.

Diagram showing the different entities involved in real time bidding, and the requests and responses
When you see an ad on a web page, behind the scenes an ad network has just automatically conducted an auction to decide which advertiser won the right to present their ad to you.
Eric Zeng, CC BY-ND

What sets Insanet's Sherlock apart from Pegasus is its exploitation of ad networks rather than vulnerabilities in phones. A Sherlock user creates an ad campaign that narrowly focuses on the target's demographic and location, and places a spyware-laden ad with an ad exchange. Once the ad is served to a web page that the target views, the spyware is secretly installed on the target's phone or computer.

Although it's too early to determine the full extent of Sherlock's capabilities and limitations, the Haaretz report found that it can infect Windows-based computers and Android phones as well as iPhones.

Spyware vs. malware

Ad networks have been used to deliver malicious software for years, a practice dubbed malvertising. In most cases, the malware is aimed at computers rather than phones, is indiscriminate, and is designed to lock a user's data as part of a ransomware attack or steal passwords to access online accounts or organizational networks. The ad networks constantly scan for malvertising and rapidly block it when detected.

Spyware, on the other hand, tends to be aimed at phones, is targeted at specific people or narrow categories of people, and is designed to clandestinely obtain sensitive information and monitor someone's activities. Once spyware infiltrates your system, it can record keystrokes, take screenshots and use various tracking mechanisms before transmitting your stolen data to the spyware's creator.

Advertisement

While its actual capabilities are still under investigation, the new Sherlock spyware is at least capable of infiltration, monitoring, data capture and data transmission, according to the Haaretz report.

The new Sherlock spyware is likely to have the same frightening capabilities as the previously discovered Pegasus.

Who's using spyware

From 2011 to 2023, at least 74 governments engaged in contracts with commercial companies to acquire spyware or digital forensics technology. National governments might deploy spyware for surveillance and gathering intelligence as well as combating and terrorism. enforcement agencies might similarly use spyware as part of investigative efforts, especially in cases involving cybercrime, organized crime or national security threats.

Companies might use spyware to monitor employees' computer activities, ostensibly to protect intellectual property, prevent data breaches or ensure compliance with company policies. Private investigators might use spyware to gather information and evidence for clients on legal or personal matters. Hackers and organized crime figures might use spyware to steal information to use in fraud or extortion schemes.

On top of the revelation that Israeli cybersecurity firms have developed a defense-proof technology that appropriates online advertising for civilian surveillance, a key concern is that Insanet's advanced spyware was legally authorized by the Israeli government for sale to a broader audience. This potentially puts virtually everyone at risk.

Advertisement

The silver lining is that Sherlock appears to be expensive to use. According to an internal company document cited in the Haaretz report, a single Sherlock infection costs a client of a company using the technology a hefty US$6.4 million.The Conversation

Claire Seungeun Lee, Associate Professor of Criminology and Justice Studies, UMass Lowell

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Did you miss our previous article…
https://www.biloxinewsevents.com/?p=289759

Advertisement
Continue Reading

The Conversation

NASA’s Mars rovers could inspire a more ethical future for AI

Published

on

Cracking down on slavery and human trafficking in NSW

Responses to violence through human trafficking and slavery demand a multifaceted approach including governments, according to a new report.
shutterstock

Jennifer Burn, University of Technology Sydney

The NSW Community Relations Commission today released a report which found the NSW government is failing to adequately acknowledge or respond to reports of human trafficking and slavery.

While many in the community think of a trafficked person as a woman working in sexual servitude, the report found that human trafficking and slavery affects men, women and children.

Exploitation through trafficking and forced labour occurs in many industries including hospitality, agriculture and factory work. Some victims are criminally exploited in private homes; others are subjected to forced marriage.

Recent cases

Over the last few weeks and months, reports of people experiencing such exploitation worldwide have put a spotlight on slavery, human trafficking and practices such as forced marriage and forced labour.

Advertisement

There were distressing reports of a high profile case in the United Kingdom where three women were allegedly held in slavery or slavery like-conditions for 30 years in an ordinary house in an ordinary residential area.

While the facts of the case are still unclear and highlight difficulties in understanding the dimension of abuse – particularly in private domestic settings – the said that the women were controlled by “invisible handcuffs” demonstrating a “complicated and disturbing picture of emotional control”.

Back in Australia, the ABC reported in July on the case of a group of Filipino boxers who were trafficked to Sydney. It was alleged the boxers' passports were confiscated and they were prevented from leaving until their debts were paid off. They lived in substandard conditions in a small garage and were given food scraps for meals.

As a result of investigation, the Australian Federal Police charged three members of a with people-trafficking offences. The case has not yet been heard.

Advertisement

In an earlier Australian case, a couple were charged and convicted of slavery offences involving the trafficking of a vulnerable Filipina woman to Australia to work in their takeaway food and as a domestic worker for their family. The woman worked in the family's takeaway food shop and the family's home in a Queensland country town every day for up to 18 hours a day.

After work, she returned to the family's home, cleaned and looked after the couple's three children and undertook other household duties. She was paid very little and was further abused. Eventually she escaped, leading to an investigation by police and charges and convictions of slavery offences.

Putting an end to slavery

New laws introduced by the Commonwealth earlier this year criminalise forced labour and forced marriage and boost the Australian legislative response to human trafficking, slavery and slavery-like practices.

People affected by trafficking and slavery must be supported in their recovery and to achieve justice. As such, the NSW Community Relations Commission has recommended that the NSW attorney-general the current Victims Rights and Support Act 2013 support scheme to include crimes related to human trafficking and slavery.

Advertisement

It also recommended the Commonwealth establish a national compensation scheme for victims of trafficking and slavery, recognising that such crimes are primarily Commonwealth offences.

People can be enslaved through subtle forms of coercion, and work in domestic servitude for very little money.
AAP/Jenny Evans

The inquiry suggested the Department of Family and Community Services assess existing services and develop an action plan to co-ordinate services for people who have experienced trafficking and slavery. Non- in NSW are currently ineligible for housing support, for instance, so the inquiry asked Housing NSW to housing services for the small number of people who are ineligible for other forms of housing support and who are in desperate need of accommodation.

The inquiry also recommended a number of simple, practical measures. Visa applicants and entrants to Australia, for instance, should be provided with more information about the Australian legal system. They should also be given enforcement contact details, information about the role of the Fair Work Ombudsman and a brief statement about Australian laws against slavery and trafficking, including forced marriage.

The inquiry noted the Commonwealth had initiated a community awareness program to boost general and specific awareness about human trafficking in slavery in Australian communities. Clearly, there is a role for NSW to work with the Commonwealth and to develop campaigns and information resources for the NSW community, in schools, and to be made available to vulnerable groups.

The inquiry also recommended the NSW government invest in more training of police, frontline government agency staff – especially in health and social services – to ensure we have the best of identifying trafficked and enslaved people in NSW and extending support to the trafficked person.

Advertisement

Responses to violence through human trafficking and slavery demand a multifaceted approach by governments and non-government agencies, and include the private sector. The inquiry sets out a pathway for NSW to co-ordinate and develop an effective state-based response to these abuses.The Conversation

Jennifer Burn, Associate Professor, Faculty of Law and Director of Anti-Slavery Australia, University of Technology Sydney

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Continue Reading

Trending