One of the government's top spy agencies, the National Security Agency, has teamed with Carnegie Mellon University to interest high school students in a game of computer hacking. Their goal with "Toaster Wars" is to cultivate the nation's next generation of cyber warriors. The free, online "high school hacking competition" is scheduled to run from April 26 to May 6, and any U.S. student or team in grades six through 12 can apply and participate.
Bitcoins are a virtual currency whose oscillations have pulled geeks and speculators...
The agency that oversees Internet domain names says it will open a satellite office in...
Malware shut down 32,000 computers and servers at three major South Korean TV networks and three...
In today's laboratories, experimental data sets are growing larger, and critical tasks such as data storage, processing, mining, and sharing have become cumbersome, error prone, and expensive. The i3D Enterprise Service, offered by Shimadzu Scientific Instruments and Integrated Analysis Inc., overcomes these challenges by integrating storage, processing, and data mining in an enterprise-level private cloud.
We live in the post-genomic era, when DNA sequence data is growing exponentially. However, for most of the genes that we identify, we have no idea of their biological functions. They are like words in a foreign language, waiting to be deciphered. A new project called CAFA, for Critical Assessment of Function Annotation, is helping channel the flood of data from genome research to deduce the function of proteins.
A variety of solid-state systems are currently being investigated as candidates for quantum bits of information, or qubits. One such qubit, a quantum dot, is made of semiconductor nanocrystals embedded in a chip, but the quality of photons generated from solid-state qubits can be low due to decoherence. Now, researchers in the U.K. have generated single photons with tailored properties from solid-state devices that are identical in quality to lasers
A Canadian research center said Wednesday that it had identified 25 different countries that host servers linked to FinFisher, a Trojan horse program which can dodge anti-virus protections to steal data, log keystrokes, eavesdrop on Skype calls, and turn microphones and webcams into live surveillance devices. This finding doesn't necessarily mean those countries' governments are using FinFisher, but it is an indication of the spyware's reach.
A new guide for Web developers recently released by NIST will make it easier for electric utilities and vendors to give customers convenient, electronic access to their energy usage data with tools and applications developed as part of the new "Green Button" initiative.
Cuba apparently has finally switched on the first undersea fiber-optic cable linking it to the outside world nearly two years after its arrival, according to analysis by a company that monitors global Internet use. In a report posted Sunday on the website of Renesys, author Doug Madory wrote that Cuba began using the ALBA-1 cable on Jan. 14.
The U.S. Department of Energy's National Renewable Energy Laboratory has created an energy analysis tool to help individuals and educators experiment with future energy use scenarios. The interactive Buildings, Industry, Transportation, Electricity, and Transportation Scenarios (BITES) allows users to explore how changes in energy demand and supply can impact carbon dioxide emissions and the current U.S. energy trajectory.
In today's engineering environment, information literacy is essential for those preparing to enter the workplace. As more experienced engineers retire, incoming engineers increasingly have to solve problems without easy access to mentors and peers who may have the insight and information the beginners need. While graduates would like to ask advice from a more experienced colleague, they increasingly turn to other sources for help.
A new study by Northwestern University researchers has revealed that public domain name services (DNS) could actually slow down users’ web-surfing experience. As a result, researchers have developed a solution to help avoid such an impact: a tool called “namehelp” that could speed web performance by 40%.
Through a new website unveiled Wednesday, Google is opening a virtual window into the secretive data centers where an intricate maze of computers process Internet search requests, show YouTube video clips, and distribute email for millions of people. The photographic access to Google's data centers coincides with the publication of a Wired magazine article about how the company builds and operates them.
A group of researchers have proposed creating a new Web-based data network to help researchers and policymakers worldwide turn existing knowledge into real-world applications and technologies and improve science and innovation policy.
No longer limited to narrow focus groups, painstaking in-person surveys, or artificially controlled studies, researchers today have a far easier time compiling and manipulating large data sets. At the same time, however, sharing such data can be fraught with risks. Researchers with the “Privacy Tools for Sharing Research Data” project at Harvard University aim to keep the flexibility and convenience of sharing large amounts of data while more fully protecting individual privacy.
If you were a bacterium, the virus M13 might seem innocuous enough. It insinuates more than it invades, setting up shop like a freeloading house guest, not a killer. Once inside it makes itself at home, eating your food, texting indiscriminately. Recently, however, bioengineers at Stanford University have given M13 a bit of a makeover; they have parasitized the parasite and harnessed M13's key attributes to create what might be termed as the biological Internet, or "Bi-Fi."
This week, an open innovation challenge called Mozilla Ignite announced eight winning ideas for innovative applications that offer a glimpse of what the Internet's future might look like, and what the lives of Americans may look like as well. The challenge called for stellar application, or "app," ideas from anywhere in the world that would advance national priorities such as health care, public safety, clean energy, and transportation.
Most major Websites maintain huge databases. Almost any transaction on a shopping site, travel site, or social networking site require multiple database queries, which can slow response time. Now, researchers at Massachusetts Institute of Technology have developed a system that automatically streamlines Websites' database access patterns, making the sites up to three times as fast.
A collaboration between a Stanford University ant biologist and a computer scientist has revealed that the behavior of harvester ant as they forage for food mirrors the protocols that control traffic on the Internet.
Northwestern University scientists have connected 250 years of organic chemical knowledge into one giant computer network—a chemical Google on steroids. A decade in the making, the software optimizes syntheses of drug molecules and other important compounds and combines long (and expensive) syntheses of compounds into shorter and more economical routes.
When it comes to delivering data to users, the Web still works brilliantly. But for other functions such as allowing users to move between wireless networks or companies to shift traffic among servers, engineers are forced to implement increasingly cumbersome tweaks. A team of Princeton University researchers has released a plan to cut through that tangle and provide a simple solution to many of the problems involved with the Internet's growing pains.
Researchers have developed a new computational method that will make it easier for scientists to identify and prioritize genes, drug targets, and strategies for repositioning drugs that are already on the market. By mining large datasets more simply and efficiently, researchers will be able to better understand genomic and proteomics interactions, as well as identify fellow researchers with whom they can collaborate.
Do you have what it takes to be an ethical hacker? Can you step into the shoes of a professional paid to outsmart supposedly locked-down systems? "Control-Alt-Hack", a new card game developed by University of Washington computer scientists, gives teenage and young-adult players a taste of what it means to be a computer-security professional defending against an ever-expanding range of digital threats.
Medical devices save countless lives, and increasingly functions such as data storage and wireless communication allow for individualized patient care and other advances. But after their recent study, an interdisciplinary team of medical researchers and computer scientists warn that federal regulators need to improve how they track security and privacy problems in medical devices.
IBM Research scientists this week unveiled a first-of-a-kind augmented reality mobile shopping app that will make it possible for consumers to pan store shelves and receive personalized product information, recommendations and coupons while they browse shopping aisles.
The Secure Shell, or SSH, is a popular program that lets computer users log onto remote machines. First release in 1995, SSH was designed for an Internet consisting of stationary machines, and it hasn't evolved with the mobile Internet. It also can't handle roaming. Now, a team of Massachusetts Institute of Technology researchs have developed a new remote-login program called Mosh, for mobile shell, which solves many of SSH's problems.
Shimi, a musical companion developed by Georgia Tech’s Center for Music Technology, recommends songs, dances to the beat and keeps the music pumping based on listener feedback. Powered by an Android phone, the robot is also app-based, meaning it can perform other functions, such as face recognition, based on the type of software programmed for it.
Although comparable migration data is available for almost every country of the world, until recently records were incompatible between nations. Information about gender and age was nonexistent. Researchers have now compiled the global flow of millions of e-mails and have discovered global migration trends contained in the data.