New findings from a team of Lawrence Berkeley National Laboratory and Japanese scientists suggest that the road to magnetic vortex RAM might be more difficult to navigate than previously supposed, but there might be unexpected rewards as well. A study at the Advanced Light Source revealed that contrary to suppositions, the formation of magnetic vortices in ferromagnetic nanodisks is an asymmetric phenomenon.
Electron microscopy reveals cellular structures in high detail, but only tiny portions of a cell can be seen at a time. A team of scientists has tackled this problem by developing new tools for stitching together thousands of electron microscopy images into single, high-resolution images of biological tissues—a "Google Earth" for cell biologists. A newly enhanced viewer is available for public use.
Quantum key distribution is not a new phenomenon and has been in commercial use for several years to secure communication networks. Recently, however, single particles of light, also known as photons, have been produced and implemented into a wireless QKD link, transmitting 40 cm through the air.
While bipeds and quadrupeds have reigned supreme in CG animation, attempts to create and control their skeleton-free cousins using similar techniques has proved time-consuming and laborious. Georgia Institute of Technology researchers have found a possible solution to this challenge by developing a way to simulate and control movement of computer-generated characters without a skeletal structure, anything from starfish and earthworms to an elephant’s trunk or the human tongue.
For decades it has been thought that a shock wave from a supernova explosion triggered the formation of our Solar System. Material from the exploding star generated cloud of dust and gas, which collapsed to form the Sun and its surrounding planets. New work from the Carnegie Institution provides the first fully 3D models for how this process could have happened.
When it comes to delivering data to users, the Web still works brilliantly. But for other functions such as allowing users to move between wireless networks or companies to shift traffic among servers, engineers are forced to implement increasingly cumbersome tweaks. A team of Princeton University researchers has released a plan to cut through that tangle and provide a simple solution to many of the problems involved with the Internet's growing pains.
It’s relatively easy to collect massive amounts of data on microbes. But the files are so large that it takes days to simply transmit them to other researchers and months to analyze once they are received. Researchers at Michigan State University have developed a new computational technique that relieves the logjam that these “big data” issues create.
Interactive proofs have emerged as one of the major research topics in theoretical computer science. In the classic interactive proof, a questioner with limited computational power tries to extract reliable information from a computationally powerful but unreliable respondent. The proofs get more complex with the addition of multiple respondents, and researchers recently solved a long-standing question about whether these types of proofs work in a quantum system.
Developed in partnership with AstraZeneca, a new private virtual laboratory product, Research Exchange, has been launched by Assay Depot. The cloud-based “laboratory” enables researchers to search for research services and vendors, communicate with experts, purchase services, and rate and review services through a single interface.
With billions of dollars and control of the U.S. smartphone and computer tablets markets at stake, jury selection began Monday in a closely watched trial between two of the world's leading tech companies over patents. Cupertino-based Apple is demanding $2.5 billion in damages from Samsung Electronics Co., an award that would dwarf the largest patent-related verdict to date.
A research team at the Georgia Tech Research Institute has developed a software tool that enables users to perform in-depth analysis of modeling and simulation data, then visualize the results on screen. The new data analysis and visualization tool offers improved ease of use compared to similar tools, the researchers say, and could be readily adapted for use with existing data sets in a variety of disciplines.
In theory, quantum computers should be able to perform certain kinds of complex calculations much faster than conventional computers, and quantum-based communication could be invulnerable to eavesdropping. But producing quantum components for real-world devices has proved to be fraught with daunting challenges. Now, a team of researchers at Massachusetts Institute of Technology and Harvard University has achieved a crucial long-term goal of such efforts.
Do you have what it takes to be an ethical hacker? Can you step into the shoes of a professional paid to outsmart supposedly locked-down systems? "Control-Alt-Hack", a new card game developed by University of Washington computer scientists, gives teenage and young-adult players a taste of what it means to be a computer-security professional defending against an ever-expanding range of digital threats.
Using data analysis methods, an international collaboration of researchers dug an unusual gamma-ray pulsar out of imagery from the Fermi Gamma-ray Space Telescope. The pulsar they found is radio-quiet, very young, and, during the observation period, experienced the strongest rotation glitch ever observed for a gamma-ray-only pulsar. The shift was so strong, the pulsar seemed to disappear.
Researchers in National Physical Laboratory's Quantum Detection Group have demonstrated, for the first time, a monolithic 3D ion microtrap array which could be scaled up to handle several tens of ion-based quantum bits. The research shows how it is possible to realize this device embedded in a semiconductor chip, and demonstrates the device's ability to confine individual ions at the nanoscale.
Environmental researchers who investigate climate change, invasive species, infectious diseases, and other data-intensive topics can now benefit from easy access to diverse data sets through technology released by the Data Observation Network for Earth, or DataONE.
Carnegie Mellon University's new Pedo-Biometrics Lab is working to perfect special shoe insoles that can help monitor access to high-security areas, like nuclear power plants or special military bases. The concept is based on research that shows each person has unique feet, and ways of walking. Sensors check on the pressure of feet and the gait, using a computer to compare patterns.
In conventional field effect transistors, the current through the device can be switched on and off by an electric field. A research team in Poland, however, has developed a new way to control electron current in a transistor-like structure by using the electrons’ spin. The new method can not only tune the electrical current in the device but also the spin-polarization of the electron current.
A team led by Harvard University computer scientists, including two undergraduate students, has developed a new tool that could lead to increased security and enhanced performance for commonly used Web and mobile applications. Called RockSalt, the clever bit of code can verify that native computer programming languages comply with a particular security policy.
In a breakthrough effort for computational biology, the world's first complete computer model of an organism has been completed, Stanford University researchers report. A team led by Stanford bioengineering Professor Markus Covert used data from more than 900 scientific papers to account for every molecular interaction that takes place in the life cycle of Mycoplasma genitalium , the world's smallest free-living bacterium.
Big data needs big power. The server farms that undergird the Internet run on a vast tide of electricity. Even companies that have invested in upgrades to minimize their eco-footprint use tremendous amounts: The New York Times estimates that Google, for example, uses enough electricity in its data centers to power about 200,000 homes. Now, a team of Princeton University engineers has a solution that could radically cut that power use.
Computerized aids that include person-like characteristics can influence trust and dependence among adults, according to a Clemson University researcher. A recently published study by a Clemson University psychology associate professor examined how decision making would be affected by a human-like aid. The study focused on adults; trust, dependence, and performance while using a computerized decision-making aid for persons with diabetes.
Scientists at Brookhaven National Laboratory and Stony Brook University have been awarded processing time on a new supercomputer at Oak Ridge National Laboratory to study how proteins fold into their 3D shapes.
Since the early days of iris recognition technologies, it has been assumed that the iris was a "stable" biometric over a person's lifetime—"one enrollment for life." However, new research from University of Notre Dame researchers has found that iris biometric enrollment is susceptible to an aging process that causes recognition performance to degrade slowly over time.
Using computer simulations, researchers from the California Institute of Technology have determined that if the interior of a dying star is spinning rapidly just before it explodes in a magnificent supernova, two different types of signals emanating from that stellar core will oscillate together at the same frequency. This could be a piece of "smoking-gun evidence" that would lead to a better understanding of supernovae.