Wednesday, December 21, 2016

None

New cross-platform GPU battlefield BaseMark x test

Mobile performance testing software more and more diverse, and more recently many GPU special test software to multiple platforms. Such as traditional mobile GPU test GLBenchmark new 3DMark has entered the mobile market and multiple platform versions, even cell phones and a computer competed. RightWare also introduced a new BaseMark x, supports iOS, Android, Windows Phone platform.

BaseMark is also a veteran of the GPU test tools, and this upgrade brings very high load test environment, built on the Unity 4.0 engine, Unity engine is widely used in the high-end mobile phone games. Through the addition of this engine, BaseMark x also introduced the particle effects, advanced lighting effects and post processing, and because these effects cause, BaseMark x mobile GPU requirements are very high.

 

In addition to professional mobile GPU performance testing, BaseMark x also provides test results online database system. Can use the online comparison platform and see the differences between mobile phones.

 

Test environment

Test software: BaseMark x Android version of Google Play download (iOS and WP8 version not yet available for download)

Test equipment:

Galaxy Note II(Mali-400MP4)

One X+(Geforce ULP)

Nexus 4(Adreno 320)

Millet 2 (Adreno 320)

Millet 2S (Adreno 320)

MX2(Mali-400MP4)

Mate(GC4000)

X1St(SGX 544) Moschino case for iPhone 6

L35h(Adreno 320)

L36h(Adreno 320)

Butterfly(Adreno 320)

Find 5(Adreno 320)

Optimus G Pro(Adreno 320)

Nexus 10(Mali-T604)

 

Here are some screenshots to BaseMark x:

Application main menu, because here are using the free version, menu of three options is to start testing, test results, and exit

New cross-platform GPU battlefield BaseMark x test

 

Screenshot of the test scenarios

New cross-platform GPU battlefield BaseMark x test New cross-platform GPU battlefield BaseMark x test

 

Test results

Screenshot of the test results are as follows, with On-Screen mode is based on the resolution of the device itself to the test environment, is the performance of GPU performance relative to the native resolution of the play, this mode we can see that the GPU for specific resolution is "good enough". Off-Screen model was unified under 1080P test GPU hardware as well as optimization level of the measure itself, not by the resolution of the device itself, is a graphical performance "absolute values" in contrast

New cross-platform GPU battlefield BaseMark x test

 

Although BaseMark x picture looked less brilliant than 3DMark and GLBenchmark 2.7, but because of the Unity engine to join a large number of particles, lighting effects, BaseMark x-press on the GPU performance significantly higher than those of other software, is the On-Screen model of the following grades comparison chart (yellow columns represent 720P, green for 1080 and above models)

New cross-platform GPU battlefield BaseMark x test

From On-Screen test results can obtain the following information:

1. completion of combination of Adreno 320+720P screen is better, though only 15~16 in the test frame, but this combination in the big game in General has been able to guarantee a better fluency.

2. the other combination is a bit eye-watering, even Adreno 320 coupled with 1080P screen, BaseMark x ultra high strength test, number of frames is not so nice. Nexus 10 GPU is powerful, but meets ultra high resolution screen, test was too much.

3. the top certainly makes Optimus g Pro opened a special "fixed aspect ratio" mode the number of frames, namely Adreno 320+480P.

4.Note 2 by overclocking and locked, frame number is clear.

 

Off-Screen model comparison chart (yellow columns represent 720P, green for 1080 and above models)

New cross-platform GPU battlefield BaseMark x test

From Off-Screen test results can obtain the following information:

1. from the GPU for absolute performance, at best is undoubtedly the Adreno BaseMark x 320, and different manufacturers on the level of optimization is slightly different.

2.Nexus 10 Mali-T604 BaseMark x the Shader performance requirements for such tests, can reach the average level of Adreno 320.

 

In addition to some mainstream models tested, the author also added some non-routine tests, such as CPU frequency-locked to Note II Galaxy 1.6GHz,GPU locked to 533MHz, this is the machine forced the lock on by default in most high frequency performance. Also join the overclocked tests, the CPU lock 1.8GHz,GPU lock 800MHz test. And by default than these two tests have different degrees of improvement.

 

Galaxy Note II (CPU lock 1.6GHz,GPU lock 533MHz)

New cross-platform GPU battlefield BaseMark x test

 

Galaxy Note II (CPU overclocking and locked 1.8GHz,GPU overclocking and lock in 800MHz)

Moschino case for iPhone 6

New cross-platform GPU battlefield BaseMark x test

 

Also added a "deformed" test, measuring cell phones have a Optimus g Pro, LG phones using Qualcomm chips are one enforced 800*480 resolution mode (intended to enhance compatibility), we can use this pattern to make the Optimus Pro g force test using 480P, this clear resolution on the impact of test results. Judging from the actual number of frames, forced to run low resolution when Optimus g Pro can also run smoothly at last scene On-Screen testing

New cross-platform GPU battlefield BaseMark x test

 

Learn more about the new cool device, please pay attention to @ love machine

Charting: Designer new

  Moschino case for iPhone 6

Related links:

Galaxy S4 hands-on demo video

"Eight-core" beast Samsung Galaxy S4 hand evaluation

Xiao long 600 weak explosions? LG Optimus g Pro detailed evaluation

Too bad Sony Xperia z performance test

IPhone play war? PSP version iOS Simulator test

 

Saturday, August 27, 2016

LinkedIn is gathered Twitter Tesla estimates fast

Lei feng's network by the writer Yin Sheng, Internet researcher, former Deputy Editor of Forbes Chinese version of value, after Lei feng's network (search for "Lei feng's network" public attention) will continue to share in his observation of the dynamics of the Internet. Articles started their letter: value line (Jia-Zhi-Xian).

LinkedIn is gathered, Twitter Tesla estimates fast

(via audiencebloom.com)

Microsoft announced yesterday to $ 26.2 billion acquisition of LinkedIn, a social networking giant in the workplace, this could be the old software giant after losing in the mobile market, tries to break the Council's action in the commercial market--after all, and from this point of view was a wise move.

LinkedIn has nearly 150 million of months active user, they is throughout global size enterprise in the of workplace elite, and Microsoft of most income also from enterprise, it of core directly user also is these workplace elite, just Microsoft has been no found a effective of way to established it and directly user Zhijian of close relationship--this let Microsoft at of cloud computing and artificial intelligence, was wrapped Shang has a layer mist--on like Facebook and it of user Zhijian of relationship as, And LinkedIn can help disperse the fog, to achieve this ambition.

If all goes well, Microsoft and companies that have established mobile advantage to Rome – established the relationship with the user. Starting from the late 90, Microsoft tries to make up for this weakness, and through MSN and achieved good results, but the PC era of path dependence, as well as their business and there were no obvious financial difficulties, thus hampering efforts to change. Until it was abandoned by the mobile era, sick rush drops medical service to buy the popularity of Nokia.

But LinkedIn not Nokia, on Microsoft,, it not only provides has oriented enterprise of human resources solution programme, to solution enterprise of pressing, also can help Microsoft from people of angle perfect its enterprise level solution programme, established a Zhang global range of "people" of network, to improve its for customer created value of capacity--known, "people" was think is a information times of enterprise most valuable of value source, and Microsoft past does not directly master this part assets.

For LinkedIn, Microsoft a huge global marketing network, cooperation is undoubtedly the most attractive header. Currently LinkedIn's main sources of income, including human resource solutions, marketing and paid subscription, but that is where the mergers worry--in the era of social networking boom, because Microsoft will focus attention on looking for marketing opportunities rather than on the structural layout, that eventually led to its failure, despite the opening of a good.

FENDI iPhone 6 plus

Understand what you need, it may be Microsoft's biggest challenge now. Hand lot cash, and and cash created capacity first-class of Microsoft, as long as solution has this problem, still has comeback of opportunities, also only such, it only may provides to LinkedIn need of addition half--from tension of profit pressure in the out out, let go Yu Microsoft real need of war, this field war of opponents is Facebook and Google such of social based facilities building who and operation who.

This is likely to be Microsoft's last chance to enter era at home, because not only it is seen through the flexible implementation of strategic opportunities to mend. Last year on the Internet by the end of 2015: orientation and the golden age of the gods, and not long ago the just yesterday, almost bubble burst again in these two articles (Editor's Note: can see the public Yin Sheng) have referred to this change: FENDI iPhone 6 plus

Market style changes of addition a evidence, is has posted has value investors label of Buffett its Bo grams Hill HA sub Wei company, in this year first quarter also appeared in Apple company big shareholders of column--despite Apple company of performance negative, and shares plunged, while, Bo grams Hill HA sub Wei company participation bid Yahoo of rumors also spread is wide, also, Yahoo company also was think is a limited to declined of Internet company.

Apple and Yahoo have in common is that they are flush with cash, cash equivalents and short-term investments, and free cash flow remains positive. This means that when the bubble burst, it's easier for companies not only survived, but also using other company's unfavorable situation, acquisitions or other layout, so that recovery becomes more powerful.

In other words, Microsoft acquisition LinkedIn just a began, next more of exists future strategy short Board, and but cash flow full or financing capacity powerful of new old giant, will joined to this field Internet birth yilai maximum of once harvest and integration in the to, like IBM, and Oracle, and Google, and Apple,, and merger of compete for object may including Salesforce, and Twitter, and Tesla, and Airbnb, and UBER,.

Common characteristics of these potential takeover targets are, in a represent the future of the field plays the leading role, but profit pressures, need to continue to blood transfusion and strong strategic support in order to achieve the maximum value of the location. Facing the merger, on the contrary, strong profitability, but there are some aspects of the future is grim. Now, uncertain economic prospects and the growth of the Internet industry is getting fever, will push the two sides back together.

Similar of merger integration in China has for has while, this may and China Internet rarely out of to, and thus its market than those take global layout of United States company faster close saturated about, Qian some years, China company of growth General than United States company high have more, but from last year began has very close, and future is may appeared in turn of situation, on like intelligent phone market, last year China of growth has far below global overall growth.

At the end of harvest and integrate, global Internet map may change, but nothing will probably change, but would allow more independent of important companies die prematurely, and the few remaining giants, will have more power, but not because they are more powerful, but because opponents less. FENDI iPhone 6 plus

Saturday, August 20, 2016

Apple has asked Taiwan parts suppliers price by 20 by companies such as Foxconn

Apple has asked Taiwan parts suppliers price by 20%, by companies such as Foxconn revolt

According to foreign media reports, given the size of Apple's own position and order, which always offer lower levels of component suppliers. Recent news from the supply chain, despite the decline in orders, but Apple still to Taiwan put pressure on parts suppliers, iPhone 7 component prices down, so Taiwan suppliers have already begun against the Apple of this continued price behavior.

Taiwan Web site reported the electronic times, and last year's iPhone compared to the 6s series mobile phone parts orders this year Taiwan supplier received iPhone 70 parts orders dropped by 30%. But Apple still require about spare parts and raw materials suppliers offer lower 20% it, suppliers meet Apple's requirements, they will not be able to get enough profit. It is learnt that the ASE (ASE) and several associated companies of Foxconn group has given a clear answer, saying unlikely to accept Apple's orders, without reasonable profits.

They made it clear, to some extent, which already has a certain amount of voice and bargaining power. Foxconn after the purchase of sharp, dependence on Apple drive ease gradually. ASE's business is also growing, packaging technology has been optimized, it also with Silicon (SPIL) merger agreement, making customers increasingly large number, greater ability to resist risks.

Industry analysts said that Apple requires suppliers cut parts in Taiwan offer, probably because parts suppliers in the Mainland's rise. But TSMC and Tari optical does not request from the Apple's price cut, TSMC on iPhone 7 exclusive contract A10, and a gloss has been built for iPhone camera module, both in the important position of Apple's supply chain.

Of course, iPhone 7 in Taiwan of spare parts orders fell 30%, this does not mean that iPhone yield declined 7. Apple will also purchase number of suppliers of products, so that their orders are regularly adjusted.

Related reading Paul Frank iPad Air 2 Case

TSMC to beat arch-rival Samsung, only Apple A11 Paul Frank iPad Air 2 Case

IPhone 6s camera suppliers price Apple will change it

Paul Frank iPad Air 2 Case

Tuesday, August 9, 2016

United States designer of super cool creative thriller frozen ice cream polar

20160806-zoku-2

Words are scary, but the effect is very good: look at these cute smile, don't you dare say you hot tempered?

Moschino Galaxy S5 Cases

William Nickley ideas from designers. Moschino Galaxy S5 Cases

Simply put, this is a set of polar animals bang model.

Including polar bears, seals, penguins, and so on.

Every paragraph has details of facial expression, face forced Meng or childlike.

20160806-zoku-1

Bracket, or handles, also reflects the extreme details-

According to the different animals, different hands. Moschino Galaxy S5 Cases

For example, the handle of the polar bear are two paws. Seals, is the back fin.

Tuesday, August 2, 2016

Russia published important research projects in space using 3D bio printer

Russia published important research projects: in space using 3D bio-printer

Recently, the Russian Federal Space Agency (Roscosmos) 's joint rocket Space Corporation (URSC) stated that the company signed an agreement with 3D Bioprinting Solutions company, the two sides will work together to develop a zero-gravity environment of magnetic 3D bio-printer. Victorias Secret iPad Mini

Victorias Secret case for iPad Mini

URSC companies mentioned: this 3D bio-printer is used to print highly sensitive to space radiation tissue and organs in order to detect long-term stays in space, organisms in the environment, what are the negative effects of cosmic radiation.

Russia published important research projects: in space using 3D bio-printer

3D Bioprinting Solutions company of the project's Scientific Director Vladimir Mironov leadership. Last year, 3D Bioprinting Solutions have been printed for the first time a thyroid, and transplanted them into mice. Through standardized laboratory procedures they have been able to produce bio-ink. This 3D bio-printer using stem cells as material, extracted stem cells from mouse adipose tissue, transplant rejection does not occur, and that these stem cells can be used as any physical body in "raw materials". In order to enable them to print correctly, stem cells are transformed into globose or layered into hydrogels and in aggregates. Zhihou, organs will be printed in a special bioreactor, in the bioreactor, the gel dissolves, organs are slowly growing mature.

However, bio-printing in space and on the Earth is different. On Earth, 3D bio-print need to use sticky bio inks to provide structural support, the ink contains chemicals and other materials, they need to rely on gravity to form continuous between the layer and the layer structure.

Russia published important research projects: in space using 3D bio-printer

But if the printed body tissue in space to meet two essential conditions: first on the establishment of a special magnetic field overcomes the zero gravity. Meanwhile, also uses finer print head and low viscosity of bio ink, the ink contains biological material required to create healthy organs. Victorias Secret case for iPad Mini

URSC General Manager Yuri Vlasov and 3D Bioprinting Solutions Youssef Hesuani believes that this project will affect the medical technology on the Earth, as a field of tissue engineering and regenerative medicine technology, it can accelerate the development of artificial human tissues and organs. It is reported that this 3D bio-printer will use in 2018 was sent to the international space station.

Wednesday, July 27, 2016

Security entrepreneur training manual information security he belonged to the

Lei Feng network (search "Lei Feng network" public, concern) by: author Zhang Ju, peak Swiss capital Director, is responsible for had Google and YouTube data center of building and shipped dimension, is Google China founding team members and first shipped dimension personnel, participation development and service environment construction, has any Joyent China District Chief, and friends friends System Chief operation officer, and speed An Zhen implementation Director, domestic first a into cloud computing industry of people. This is Zhang Ju in Ali's Security Summit entitled Investing in the eyes of "sense of" entrepreneurs of part of speech, resolve current problems and opportunities of the network security team, investors, entrepreneurs what security is "security"?

Security entrepreneur training manual: information security, he belonged to the circle of people

Investment in people's eyes "sense of" entrepreneurs

In the past year, China information security business to become very hot. Leaders set up a central network security and information technology since the head of the leading group, and as information security industry is receiving more and more attention, and "unknown Jue Li". It from the top, completely changed the investment community and industry for information security basic perception of entrepreneurship, making it a relatively neutral became a hot event.

I'd like to share with you, my years of observation and idea of entrepreneurial information security practitioners. Business no matter how I look at is a process of growth and transformation. It is important, since bound to begin this process, both non-defeat, threw back his head and be a hero.

1, for the destruction of "otherness"

Internal people, information security practitioner is actually a very special, very rare group. In thought, and computer engineers have essential differences in the traditional sense. Engineers have a pervasive idea: use of technology resources and raw materials, many components built into a system, in order to achieve a particular functionality. This is a typical construction and the creative process.

Contrary to the idea of information security practitioners. When they see a running system, usually think of is whether there are any loopholes in the system, and unreasonable on the design, use, construction of the weaknesses, and through these loopholes, shortcomings and weaknesses, to surrender the system, change their behavior leading to injury, or for our use. This process is a typical failure process.

Security entrepreneur training manual: information security, he belonged to the circle of people

Information security practitioners are often destructive of genius thinking MIU MIU iPhone 5 Case

Information security practitioners are usually destructive genius thinking people. However, our education system is pressed, correction, or even put an end to this destructive thinking. Survive or escape the baptism of open education, and in any case should be regarded as "other".

MIU MIU iPhone 5 Case

If traced back, education is perhaps the second. Because most of our evolution of destructive thinking individual is very negative. In the development of human resources is scarce for most States, constructive and creative individuals in an era of scarce resources is more likely to survive, while the natural destruction of the individual will live more difficult, both in food as well as color.

2, information security, he belongs to the insider's

Look out, legendary martial arts sensation in the field of information security. Large circles from the outside is a relative mystery, the people inside have special skills, can not for ordinary people. When it comes to martial arts, one very important thing is the influential people, it is also very important in information security. When it comes to influential, in fact, is two things, one is the level of martial arts. Like martial arts, parties everywhere as well as information security circles, the result is information security may be the technology one of the most competitive areas in the field. There should be more than half the world's offensive and defensive information security competition, held in East Asia.

Security entrepreneur training manual: information security, he belonged to the circle of people

Information security as a martial arts

Second, in addition to the skill, and character. Like the martial arts, and loyalty are often influential high master of information security practitioners often start from the hacker, then became a very influential experts in the field vertically. Along the way, grace JI, made friends with a group of friends, murderous, also have a group of loyal fans, becoming Lady in the field.

Entrepreneurship is different from other areas of information security, one of the main features is that this is an insider thing. A non-information security industry outsider, information security business, basically just play try. There is an old saying in China that was in place: operation not dispell, not Moss. And the entrepreneurial nature of this thing is to fight all the way to achieve fame and fortune. The process for entrepreneurs, both original nature, is often a challenge, is a process of reshaping, re-growth.

3, information security business: Liu Bang Xiang Yu fighting + strategy

Information security practitioners of growth process and is a classic from soldiers to generals, then to the heads of State of the process. They started out as a skilled engineering staff, following the actual confrontation become industry experts. A good security officer would normally through one's own ideas and technical heritage formed an influential coterie of soldiers which also meet the general location. This point is often the time to start thinking about entrepreneurship information security practitioners. Because they have the knowledge, experience, ideas, and even has a lot of contacts.

Security entrepreneur training manual: information security, he belonged to the circle of people

Development of information security in China is a typical from soldiers to generals and heads of

In fact, entrepreneurship is the key to the process from General to heads of State. There is too much uncertainty in this process, there are so many challenges and issues, there are too many want to consolidate resources and the need to unite forces, so there must be some means of circumvention, or requires a lot of compromise. This process is often from a high profile, high standards of military personnel, to a landing and the evolution of practical politicians.

Many information security practitioners who, intentionally or not Xiang Yu's shadow: not only courageous, but also goes out to win not only contempt for authority casual ease, more beauty in his arms. But truly successful entrepreneurs must add the element of Liu Bang: that is, essence of mastery of the people and the insight, vision, and adhere to, or compromise.

4, opposite, his fast is not broken

Information security is a very broad field (on the rapid development of information technology, information security coverage is rapidly increasing). Attack and defense of information security is an Evergreen property determines the information security market: evolving methods to create information security start-ups will spring up. In this context, information security practitioners in search of entrepreneurial direction need not to follow the so-called hot spots.

Security entrepreneur training manual: information security, he belonged to the circle of people

Information security defense decides this is a green market.

Information technology and entertainment industries have great similarities. We can do the opposite, take a step back and look, in fact, information security professionals are good at reverse engineering capability is now scarce by the impetuous business environment: a view of the current situation to find the cracks, weaknesses and imperfections are used.

Business startup with reverse thinking way more effective than positive, especially in the field of information security. Reverse thinking is often seen, current technology architecture and the current market environment, positive thinking is not easy to see, very clear weaknesses and imperfections. Can be launched from here to choose the appropriate direction, what kind of things do.

Business ultimately is one thing. Together with the industry, all the biggest challenges entrepreneurs face. It entrepreneurs especially for the information security. Good information security practitioners are very scarce resources, plus BAT3 (Baidu, Alibaba group, Tencent and qihoo 360) the past few years for the hoarding of information security personnel (all familiar names, basically to staggering salaries on a global scale, was under them), this means that the venture is nearly impossible from the angle of economic benefits and competition.

Security entrepreneur training manual: information security, he belonged to the circle of people

Influential information security company more attractive than the Giants.

Really are the rivers and Lakes of his generation in the field of information security personnel, familiar names were just part of a true master, and more importantly, young talented people to value most is often not economic interests, but with the same great people working together, growing from more good people to see their future career development.

This also explains the truly outstanding entrepreneurial team in gathering of information security industry tend to be more automatic. Good information security practitioner, have the opportunity, through its knowledge and expertise in the field of, to create very attractive personal brand. In a Word, your status of lakes are often more attractive than the icy giants.

Only the fast is not broken, an Internet entrepreneur was promoted to the extreme concept, I personally think it is harmful to entrepreneurship in the field of information security. Part of it is, all processes are usually not as fast as we talked about; and more importantly, the effectiveness of information security products are offensive and defensive information security embodied in the confrontation, as other offensive and defensive characteristics of the products, such as drugs and weapons development, often fail to help the product successful.

It cannot be denied that opportunity is an important cause decided to start a business to business success, but they usually boil out. Patience comes from confidence in the future and their own. When you do this thing very confident, will have the patience and insist to wait. I feel slow down information safety entrepreneurs is an important starting point.

5, adhere to principles, maintain discipline, leading by example

Management have a lot to say about the company and school, especially popular are various discusses how to manage a high IQ, high capacity crowd of theory. You can say a lot of fancy management concept, but the ultimate goal is to establish an efficient organizational structure to achieve technical and commercial objectives.

Cast aside the theory of, I think the essence of management is the most important two things:

Is to have principles, the second is to have discipline.

Principles for information security practitioners don't, discipline is more difficult to grasp and implement information security practitioners.

Security entrepreneur training manual: information security, he belonged to the circle of people

Discipline is often more difficult to grasp and implement information security practitioners.

Management itself is an organization within the system you want to set up a good, reasonable standard. Specification depends on the discipline to protect, all things should be at a reasonable standard. Company culture built on the company adhering to the principles, including principles, it is important what not to do. These are paramount to an information security firm – internal principle is fairness, impartiality, respect each other behind the principles and discipline, and also have a little more to the founder's own request, and that is to lead by example. Information security practitioners many times on rules and disciplines are almost paranoid disdain, but adherence to the principles and discipline, the founder, is driving the development of the entire company into a well-managed, cultural entity of basic requirements for good.

6, was born in fear and market position from the trust MIU MIU iPhone 5 Case

The nature of the information security market driving force is fear-the fear of data theft of assets, fears of trade secret theft of information security incidents leading to fears the loss of brand, reputation and customer.

In fact, many of the industry's business model is built on the basis of fear. Insurance is another fear based industries combination of insurance and the information security industry is a very important topic of discussion. Fear itself is a big driving force, so that customers find your products, and your services to providing information security safeguards.

Clearly, the fear is the starting point for information security products and services fall, but a hope that the long-term development of information security company, be sure not to enhance the sense of fear as a means of market feedback. As implementation of security capabilities, information security company market position from trust instead of fear.

Trust, stronger, comes great responsibility. A truly successful company is usually a rule established in the field of information security, the man rather than a protection fee.

Security entrepreneur training manual: information security, he belonged to the circle of people

The nature of the information security market driven by fear.

In short, fear and, then, to seek and win, to governance and stability, to Germany for a long time, it was probably a security startups from scratch, from weak to strong process. Finally would like to share: heroic feet on those who do.

I would like to dedicate this entrepreneurial way of information security practitioners. 

Lei Feng network Note: the copyright belongs to the peak and the Swiss capital, please contact our licensing and keep the source and author, no deletion of content.

Wednesday, July 20, 2016

1 people free mind control 4 drones you Americans really can play

1 people free mind control 4 drones, you Americans really can play

According to the United Kingdom, the daily mail reports, the Americans set up a research and development team has developed a human brain waves to control multi-UAV technology, recently they are trying a large number of UAVs, unmanned aerial vehicles qualified for a variety of tasks using this way.

This research group by HORC lab researchers at Arizona State University, in 2014, the United States Defense Advanced research projects Agency (Darpa) for laboratory research team offers a $ 860,000 in funding.

Paul Frank iPhone case

Operators need to wear a helmet with 128 electrodes attached to your computer, to record the electrical activity of the brain. When driven drone, operators need staring at the screen, and UAVs perform a variety of tasks in the brain. When staring at the pilot when the drones, some ideas will be read by the computer. By observing the controller's brain electrical activity, to control a variety of variables, coordinating the activities of drones.

Every human thought or behavior changes, the corresponding region of the brain will "discharge", if the pilot moved the limbs, or if he had any ideas, helmet corresponds to the Union of regions will lit. In simple terms, every piece of bright area represents the pilot of a thought or behavior, so the "lit" behind the information into thought and behavior signal passed to the robot via Bluetooth device, you can use mind controlled drone. Through motion-capture system, the computer can know the location which you want to move the pilot drones.

This technique can cause the brain to simultaneously control up to 4 drones, and is unable to control handle so many unmanned aerial vehicles for collective action. In the last twenty or thirty years, experts have just one brain-computer interaction has been much studied. As early as in 2011, the research team at the University of Minnesota has brain waves to control a computer inside the virtual drone, but then everyone can control a drone, and now technology can achieve one of the HORC laboratory group control multiple devices. Paul Frank iPhone case Paul Frank iPhone case

HORC lab goals and more than that, however, they will try to control multiple robots with so many people. And also wants to be able to let the UAV can perform complex tasks such as search and rescue, or even to build a include sea, land, air and integrated team.