For 15 years trucks have been hauling decades worth of plutonium-contaminated waste to what is supposed to be a safe and final resting place a half mile underground in the salt beds of the Permian Basin in New Mexico. But back-to-back accidents and an above-ground radiation release shuttered the government's only deep underground nuclear waste dump and raised questions about the $5-billion-a-year program for cleaning up legacy waste.
Standing in a full-body scanner at an airport isn’...
Imagine a user who intends to send $2 to a friend...
An international partnerships is aiming to develop...
NIST and American Univ. researchers report in a new study that the bench-scale test widely used to evaluate whether a burning cigarette will ignite upholstered furniture may underestimate the tendency of component materials to smolder when these materials are used in sofas and chairs supported by springs or cloth. The study comes as regulations and methods for evaluating ignition in furniture are undergoing scrutiny.
Researchers in the George E. Brown, Jr. Network for Earthquake Engineering Simulation have studied concrete buildings constructed before roughly 1980 in the Los Angeles area. Their work has identified examples of this category of buildings, sometimes referred to as nonductile concrete buildings, which are known from experience in previous earthquakes to have the potential for catastrophic collapse during strong earthquakes.
Computer scientist Yi-Kai Liu at NIST has devised a way to make a security device that has proved notoriously difficult to build: a "one-shot" memory unit, whose contents can be read only a single time. The innovation, which uses qubits and conjugate coding, shows in theory how the laws of quantum physics could allow for the construction of such memory devices.
According to a report from The New York Times, the National Security Agency has implanted software in nearly 100,000 computers around the world that allows the U.S. to conduct surveillance on those machines. The technology, which is not used in the U.S., relies on radio waves that can be transmitted from tiny circuit boards and USB cards inserted covertly into the computers.
A German magazine lifted the lid on the operations of the National Security Agency's hacking unit Sunday, reporting that American spies intercept computer deliveries, exploit hardware vulnerabilities, and even hijack Microsoft's internal reporting system to spy on their targets.
Even as Silicon Valley speaks out against the U.S. government's surveillance methods, technology companies are turning a handsome profit by mining personal data. Tarnished by revelations that the National Security Agency trolls deep into the everyday lives of Web surfers, companies like Apple, Facebook, Google, and Microsoft are aggressively battling any perception that they voluntarily give the government access to users' information.
Buried under thousands of miles of pavement in California are 27,000 traffic sensors that are supposed to help troubleshoot both daily commutes and long-term maintenance needs on some of the nation's most heavily used and congested roadways. About 9,000 of them do not work, despite their critical role in an "intelligent transportation" system designed to do things like detect the congestion that quickly builds after an accident.
Amid a rash of tombstone thefts from cemeteries in Johannesburg, a company will be offering relatives of the deceased a high-tech solution: microchips that can be inserted into the memorial that will sound an alarm and send a text message to their cell phones if it is disturbed.
Iris scans, fingerprint scans, facial and voice recognition are tools that improve security while making our lives easier, says Stephen Elliott, director of international biometric research at Purdue Univ. His basement lab is a place where emerging biometric technologies are tested for weaknesses before they can go mainstream.
The widespread use of advanced surveillance technologies by state and local police departments will improve the efficiency of criminal investigations. But a lack of oversight and regulation poses significant privacy concerns, warns Stephen Rushin, a professor of law at the Univ. of Illinois.
A new market study forecasts that the global market for driver monitoring systems will reach 64.8 million units by the end of 2020 with the majority of shipments being accounted for in vehicles sold in the Asia-Pacific region. A major 2013 is that these systems are migrating from the luxury brands like Volvo and Mercedes-Benz to more mass market models.
Mystaire has announced the release of Aura ductless chemical fume hoods, featuring EverSafe II microprocessor safety controller monitors and adjustable fume hood face velocity to user preset values.
As cars become more like PCs on wheels, what's to stop a hacker from taking over yours? In recent demonstrations, hackers have shown they can slam a car's brakes at freeway speeds, jerk the steering wheel and even shut down the engine — all from their laptop computers. The hackers are...
Vulnerabilities in software and firmware are the easiest ways to attack a system, and two revised publications from NIST approach the problem by providing new guidance for software patching and warding off malware. The new computer security guides to help computer system managers protect their systems.
A new report by biometric researchers at NIST uses data from thousands of frequent travelers enrolled in an iris recognition program to determine that no consistent change occurs in the distinguishing texture of their irises for at least a decade. These findings inform identity program administrators on how often iris images need to be recaptured to maintain accuracy.
Carbon monoxide poisoning is a significant problem for construction workers because it can build up quickly in enclosed spaces from use of gasoline-powered tools. New research calls for the use of a wearable computing system installed in a helmet to protect construction workers from this type of poisoning.
In an effort to thwart forgeries, researchers in Switzerland have proposed a new miniaturized authentication system. By combining moiré patterns and microlithography techniques, authorities can be easily recognize counterfeits with the naked eye and counterfeiters will find it impossible to reproduce items through currently existing printer or scanner technology.
GOJO Industries, a maker of hand hygiene and skin health and inventors of Purell Hand Sanitizer, conducted an independent research study at the John Peter Smith Hospital in Fort Worth, Texas to determine the impact on hand hygiene compliance rates when the hospital hand hygiene program included an electronic compliance activity monitoring system. The research showed a 92% hand hygiene improvement.
There is increasing pressure on the chemical and related industries to ensure that their products comply with increasing numbers of safety regulations. Researchers at the Univ. of Kansas have developed a computational technique that could allow the industry to predict whether a given compound will be toxic even at a low dose and thus allow alternatives to be found when necessary.
A Personal Identity Verification (PIV) card is a government-issued smart card used by federal employees and contractors to access government facilities and computer networks. To assist agencies seeking stronger security and greater operational flexibility, NIST has made several modifications to the previous version of Biometric Data Specification for PIV cards.
Research is growing with high-tech gadgets that promise new safety nets for seniors determined to live on their own for as long as possible. Motion sensors on the wall and a monitor under the mattress one day might automatically alert loved ones to early signs of trouble well before an elderly loved one gets sick or suffers a fall.
Relief may be on the way for airline passengers who can't bear to be separated even briefly from their personal electronic devices. The government is moving toward allowing gate-to-gate use of music players, tablets, laptops, smartphones and other gadgets. Howeveer, restrictions on cellphone calls and Internet use and transmission are not expected to be changed.
This week, Sandia National Laboratories is hosting the seventh annual Western National Robot Rodeo and Capability Exercise, a challenging five-day event that draws civilian and military bomb squad teams from across the country to see who can most effectively defuse dangerous situations with the help of robots. The competition provides an opportunity to practice using robots and new technology in a low-risk, but competitive environment.
Americans are accustomed to calling 9-1-1 to get help in an emergency. A research team lead by Ram Dantu of the University of North Texas sees the growth of cell phone and smartphone usage as an opportunity to improve 9-1-1 response. His team has designed several innovative smart phone apps that virtually place 9-1-1 operators at the scene of an emergency, allowing faster response.
Engineers in California have developed new image processing techniques for rapid exploration and characterization of structural fires by small Segway-like robotic vehicles. Thermal data recorded by the robot’s small infrared camera is maps it onto a 3-D scene created by a pair of stereo cameras, producing a virtual reality picture that can be used by first responders as the robot navigates a building.
- Page 1