It's an RFID chip, and without a battery, yet it nevertheless has half a meg of data onboard.http://home.businesswire.com/portal/site/google/index.jsp?ndmViewId=news_view&newsId=20060716005035&newsLang=enNice spimey rhetoric from the R&D lads here:"The Memory Spot chip frees digital content from the electronic world of the PC and the Internet and arranges it all around us in our physical world," said Ed McDonnell, Memory Spot project manager, HP Labs."This really bridges the digital and physical worlds," said Howard Taub, associate director at HP Labs. "The digital data is attached to the physical object it's related to.""Memory Spot chips have numerous possible consumer and business-based applications. Some examples are:– Medical records: Embed a Memory Spot chip into a hospital patient's wrist band and full medical and drug records can be kept securely available.– Audio photo: Attach a chip to the prints of photographs and add music, commentary or ambient sound to enhance the enjoyment of viewing photos.– Digital postcards: Send a traditional holiday postcard to family and friends with a chip containing digital pictures of a vacation, plus sounds and even video clips.– Document notes: A Memory Spot chip attached to a paper document can include a history of all the corrections and additions made to the text, as well as voice notes and graphical images.– Perfect photocopies: A Memory Spot chip attached to a cover sheet eliminates the need to copy the original document. Just read the perfect digital version into the photocopier and the result will be sharp output every time, no matter how many copies are needed, and avoiding any possibility of the originals jamming in the feeder.– Security passes: Add a chip to an identity card or security pass for the best of both worlds – a handy card with secure, relevant digital information included.– Anti-counterfeit tags: Counterfeit drugs are a significant problem globally. Memory Spot chips can contain secure information about the manufacture and quality of pharmaceuticals. When added to a drug container, this can prove their authenticity. A similar process could be used to verify high-value engineering and aviation components.http://home.businesswire.com/portal/site/google/index.jsp?ndmViewId=news_view&newsId=20060716005035&newsLang=en(((The arphid world seems to have two (2) size comparisons – grains of rice, and pencil-points.)))
Your Vape Wants to Know How Old You Are
Companies hope that biometric age-verification tech in cartridges could put flavored vapes back in business. But it's unlikely to solve the real problems.
Boone Ashworth
A Hot-Air Balloon Landed in a California Backyard. The Owner Says It's a 'Very Rare' Event
The CEO of Magical Adventures Balloon Rides tells WIRED how the pilot made a safe landing after they got stranded over a neighborhood.
Brian Barrett
Nobody Knows How to File Taxes on Prediction Market Wins
Americans flocked to prediction markets last year. Now, it’s time to pay taxes on winnings. How do you do that? Great question.
Kate Knibbs
The Last Airbender Leaked Online. Some Fans Say Paramount Deserves the Fallout
After the full movie leaked, animators mourned the chance to release their work as intended. Others feel the leak is justified in light of Paramount’s marketing blunders and association with Trump.
Miles Klee
The Internet's Most Powerful Archiving Tool Is in Peril
As major news outlets cut off the Wayback Machine, journalists and advocacy groups are rallying to protect the Internet Archive’s vast collection of web pages.
Kate Knibbs
Telegram Is Still Hosting a Sanctioned $21 Billion Crypto Scammer Black Market
The UK designated Xinbi Guarantee as an enabler of crypto scammers and human trafficking weeks ago. Telegram is still hosting it in plain sight.
Andy Greenberg
The Trajectory of the Artemis II Moon Mission Is a Feat of Engineering
The astronauts will arrive about 10,300 kilometers beyond our satellite, breaking all previous records for distance from Earth. But how was their route chosen?
Luca Nardi
Even Artemis II Astronauts Have Microsoft Outlook Problems
The mission commander’s email inbox failed during the journey to the moon. Have they tried turning the computer off and back on again?
Jeremy White
Anduril Wants to Own the Future of War Tech. Mishaps, Delays, and Challenges Abound
From drones to missiles to submarines, the $30.5 billion defense startup wants to transform how the tools of war are made. It’s not all going as planned.
Paresh Dave
Using a VPN May Subject You to NSA Spying
US lawmakers are pressing Tulsi Gabbard to reveal whether using a VPN can strip Americans of their constitutional protections against warrantless surveillance.
Dell Cameron
Uncanny Valley: OpenAI and Musk Fight Again; DOJ Mishandles Voter Data; Artemis II Comes Home
In this episode, the hosts discuss the fight between OpenAI and Elon Musk, the misuse of voter data, and Artemis II’s moonshot.
Brian Barrett
CBP Facility Codes Sure Seem to Have Leaked Via Online Flashcards
The Quizlet flashcards, which WIRED found through basic Google searches, seem to include sensitive information about gate security at Customs and Border Protection locations.
Sammy Sussman