A revolutionary new method of encrypting confidential information has been patented by scientists who were inspired by discoveries from human biology, which model how the heart and lungs coordinate their rhythms by passing information between each other.
Cyber attacks are the primary domestic security threat facing the United States, FBI Director...
ACM Turing Award Goes to Leslie Lamport for Work Enabling Distributed Computing in Data Center, Security, Cloud LandscapesMarch 19, 2014 9:33 am | by The Association for Computing Machinery | News | Comments
The Association for Computing Machinery has named Leslie Lamport, a Principal Researcher at...
The British inventor of the World Wide Web wants a digital bill of rights to protect Internet...
The way we secure digital transactions could soon change. A team has demonstrated a form of quantum cryptography that can protect people doing business with others they may not know or trust — a situation encountered often on the internet and in everyday life. In cryptography, the problem of providing a secure way for two mutually distrustful parties to interact is known as two-party secure computation...
Here is an agency-by-agency summary of President Barack Obama's proposed budget for fiscal 2015, beginning next Oct. 1. The top-line figures do not include spending on automatic entitlement benefits like Medicare and Social Security. The top-line figures for each agency also omit the $55.4 billion "opportunity" initiative Obama would divide equally between domestic and military programs.
Lawrence Livermore has joined forces with two other national labs to deliver next generation supercomputers able to perform up to 200 peak petaflops (quadrillions of floating point operations per second), about 10 times faster than today's most powerful high performance computing (HPC) systems.
AT&T and IBM have announced a new global alliance agreement to develop solutions that help support the "Internet of Things." The companies will combine their analytic platforms, cloud and security technologies with privacy in mind to gain more insights on data collected from machines in a variety of industries.
It used to be that "hacking" was just a type of crime, a computer break-in. But today, the term is also part of a growing — and perfectly legal — mainstay of the tech sector. Computer programming competitions known as "hackathons" have spread like viruses in recent years as ways for geeks, nerds and designers to get together to eat pizza, lose sleep and create something new.
IBM announced a new service offering to help critical infrastructure organizations utilize a new Cybersecurity Framework announced by the Administration at the White House. The new Cybersecurity Framework is the product of a year-long collaboration between the U.S. government and industry, coordinated and led by the National Institute of Standards and Technology (NIST).
Alan Turing: His Work and Impact, was selected for the top honor, R.R. Hawkins Award, at the 38th annual PROSE Awards. Celebrating the centenary of his birth, the bookwas praised as a fitting tribute to the life of the legendary mathematical and scientific genius, considered to be the father of theoretical computer science and artificial intelligence.
A flurry of new reports from major technology companies show that the government collects customer information on tens of thousands of Americans every six months as part of secret national security investigations. And the companies' top lawyers struck a combative stance, saying the Obama administrative needs to provide more transparency about its data collection.
Working on her blog in California one day, Vietnamese democracy activist Ngoc Thu sensed something was wrong. It took a moment for a keystroke to register. Cut-and-paste wasn't working. She had "a feeling that somebody was there" inside her computer. Her hunch turned out to be right.
The earth lurched without warning before dawn, jolting Los Angeles from its sleep. In a flash, freeway overpasses collapsed. Buildings were leveled or ruined. Fires spread. Two decades after a magnitude-6.7 earthquake shattered Los Angeles and surrounding communities, buildings around the region remain vulnerable.
Until recently, measuring a 27-dimensional quantum state would have been a time-consuming, multistage process using a technique called quantum tomography, which is similar to creating a 3-D image from many 2-D ones. Researchers at the University of Rochester have been able to apply a recently developed, alternative method called direct measurement to do this in a single experiment with no post-processing.
Raytheon Company will recognize middle and high school math teachers across the country for their commitment to science, technology, engineering and math (STEM) education through grants to support their work in the classroom. The company’s MathMovesU program invites all members of the community to recognize inspirational math teachers and coaches for their dedication to improving math education with a MathMovesU Math Hero Award.
IBM has announced plans to commit over $1.2 billion to significantly expand its global cloud footprint. This investment includes a network of data centers designed to bring clients greater flexibility, transparency and control over how they manage their data, run their businesses and deploy their IT operations in the cloud.
Boeing has identified "green diesel," a renewable fuel used in ground transportation, as a significant new source of sustainable aviation biofuel that emits at least 50 percent less carbon dioxide than fossil fuel over its lifecycle. The company is working with the U.S. Federal Aviation Administration and other stakeholders to gain approval for aircraft to fly on green diesel, further reducing the aviation industry's carbon emissions.
Computer security systems may one day get a boost from quantum physics, as a result of recent research from the National Institute of Standards and Technology (NIST). Computer scientist Yi-Kai Liu has devised a way to make a security device that has proved notoriously difficult to build — a "one-shot" memory unit, whose contents can be read only a single time.
It is one the oldest mathematical problems in the world. Several centuries ago, the twin primes conjecture was formulated. As its name indicates, this hypothesis deals with prime numbers, those divisible only by themselves and by one. Under this assumption, there exists an infinite number of pairs of prime numbers whose difference is two, called twin primes, but nobody has been able to confirm this so far.
At least eight researchers or policy experts have withdrawn from an Internet security conference after the sponsor reportedly used flawed encryption technology deliberately in commercial software to allow the National Security Agency to spy more easily on computer users.
Data Integrity in a Nutshell: Industry must take bold steps to assure the data used for drug quality decisions is trustworthyJanuary 7, 2014 12:31 pm | by Mark E. Newton | Articles | Comments
Regulatory inspectors have started digging much deeper into data, no longer accepting batch release data and supportive testing at face value. Even worse, this effort is justified: they have cited a number of firms for violations of data integrity, a most fundamental bond of trust between manufacturers and the regulators that inspect them. Industry must take bold steps to assure the data used for drug quality decisions is trustworthy...
Data integrity is a current hot topic with regulatory agencies, as seen with recent publications in this magazine, and audit trails are an important aspect of ensuring this in computerized systems. The purpose of this article is to compare and contrast the EU and FDA GMP regulatory requirements for computerized system audit trails.
Northrop Grumman and the U.S. Navy have completed nine initial flight tests of the Triton unmanned aircraft system (UAS), marking the half-way point in a process called envelope expansion. During envelope expansion, the test team validates the aircraft's ability to operate at a range of altitudes, speeds and weights.
The new HITS research group “Data Mining and Uncertainty Quantification” analyzes large amounts of data and calculates uncertainties in technical systems. With Prof. Vincent Heuveline as their group leader, the group of mathematicians and computer scientists especially focuses on increasing the security of technology in operating rooms.
Rare earthquake lights are more likely to occur on or near rift environments, where subvertical faults allow stress-induced electrical currents to flow rapidly to the surface, according to a new study published in Seismological Research Letters. From the early days of seismology, the luminous phenomena associated with some earthquakes have intrigued scholars. Earthquake lights (EQL) appear before or during earthquakes, but rarely after.
Global research and development (R&D) spending is forecast to grow by 3.8 percent — or $60.0 billion — to $1.6 trillion in 2014, according to the closely watched annual forecast by Battelle and R&D Magazine. After a flat year of R&D spending in 2013, the U.S. is projected to show modest growth while China is expected to continue its two-decade upward trajectory in R&D investment.
A German magazine lifted the lid on the operations of the National Security Agency's hacking unit on December 29, 2013, reporting that American spies intercept computer deliveries, exploit hardware vulnerabilities, and even hijack Microsoft's internal reporting system to spy on their targets.
Lockheed Martin Advanced Technology Laboratories (ATL) recently completed the Defense Advanced Research Projects Agency (DARPA) Robotics Challenge trials at the Homestead-Miami Speedway. The Lockheed Martin-led team, which includes the University of Pennsylvania and Rensselaer Polytechnic Institute, guided an Atlas humanoid robot through a number of tasks designed to simulate disaster response scenarios.
- Page 1