Advertisement
Internet
Subscribe to Internet

The Lead

Microsoft revamps MSN to flow across devices

September 8, 2014 12:25 am | by Mae Anderson - AP Technology Writer - Associated Press | News | Comments

Microsoft is giving its MSN news service a crisper look, new lifestyle tools and seamless syncing across devices. The company says the revamped site fits in with Microsoft's overall strategy of making mobile phones and Internet-based services priorities as its traditional businesses—Windows and Office software installed on desktops—slow down or decline.

How Big is Big—Tall, Grande, Venti Data?

September 2, 2014 1:51 pm | by Nick Burch, CTO, Quanticate | Articles | Comments

Today, big data is a hot topic within almost every industry. May saw the biggest ever European...

Controlling a NASA robot on the Web

August 27, 2014 12:10 pm | by Kevin Stacey, Brown Univ. | News | Comments

A group of computer scientists from Brown Univ. were at the Johnson Space Center in Houston for...

Smartphones set out to decipher a cryptographic system

August 26, 2014 8:29 am | by Sébastien Corthésy, EPFL | News | Comments

Researchers in Switzerland have created an Android...

View Sample

FREE Email Newsletter

Our connection to content

August 19, 2014 9:34 am | by Rob Matheson, MIT News Office | News | Comments

It’s often said that humans are wired to connect: The neural wiring that helps us read the emotions and actions of other people may be a foundation for human empathy. But for the past eight years, MIT Media Lab spinout Innerscope Research has been using neuroscience technologies that gauge subconscious emotions by monitoring brain and body activity to show just how powerfully we also connect to media and marketing communications.

Researchers develop defense software "TCP Stealth"

August 15, 2014 11:19 am | News | Comments

Port scanners are programs that search the Internet for systems that exhibit potential vulnerabilities. According to report published online, Hacienda is one such port scanning program. The report says that this program is being put into service by the "Five Eyes," a federation of Western secret services. Scientists have developed free software that can help prevent this kind of identification and thus the subsequent capture of systems.

New tool makes a single picture worth a thousand—and more—images

August 14, 2014 5:57 pm | by Sarah Yang, Univ. of California, Berkeley | Videos | Comments

Software developed by Univ. of California, Berkeley computer scientists seeks to tame the vast amount of visual data in the world by generating a single photo that can represent massive clusters of images. This tool can give users the photographic gist of a kid on Santa’s lap, housecats, or brides and grooms at their weddings. It works by generating an image that literally averages the key features of the other photos.

Advertisement

Database accelerates the development of new materials

August 8, 2014 2:05 pm | News | Comments

Performing systematic analyses of both known and imagined chemical compounds to find their key properties, Northwestern Univ. engineers have created a database that takes some of the guesswork out of designing new materials. Called the Open Quantum Materials Database (OQMD), it launched in November and is the largest database in the world of its kind, containing analyses of 285,780 compounds and growing.

Report: Russian hackers steal 1.2B passwords

August 6, 2014 10:10 am | News | Comments

Russian hackers have stolen 1.2 billion user names and passwords in a series of Internet heists affecting 420,000 websites, according to a report published Tuesday. The thievery was described in a New York Times story based on the findings of Hold Security, a Milwaukee firm that has a history of uncovering online security breaches. For confidentiality reasons, the identities of the affected websites weren't identified by the Times.

No-power Wi-Fi connectivity could fuel Internet of Things reality

August 6, 2014 8:11 am | by Michelle Ma, Univ. of Washington | Videos | Comments

Imagine a world in which your wristwatch or other wearable device communicates directly with your online profiles, storing information about your daily activities where you can best access it—all without requiring batteries. Or, battery-free sensors embedded around your home could track minute-by-minute temperature changes and send that information to your thermostat to help conserve energy.

Extracting audio from visual information

August 4, 2014 12:17 pm | by Larry Hardesty, MIT News Office | Videos | Comments

Researchers at MIT, Microsoft, and Adobe have developed an algorithm that can reconstruct an audio signal by analyzing minute vibrations of objects depicted in video. In one set of experiments, they were able to recover intelligible speech from the vibrations of a potato-chip bag photographed from 15 feet away through soundproof glass.

Thomson Reuters launch new analytics platform, InCites

July 31, 2014 11:55 am | News | Comments

An integrated, web-based platform for measuring research output and impact, monitoring trends and benchmarking, InCites is Thomson Reuters’ latest effort to allow users to easily assess and look beyond the global influence of a specific journal to conduct transparent analysis and make better decisions. The expanded assessment solution has been implemented on the 2014 edition of Journal Citation Reports.

Advertisement

DARPA collaboration launches breakthrough elastic cloud-to-cloud networking

July 29, 2014 9:06 am | News | Comments

In 2006, DARPA launched a long-term project called CORONET, which sought to develop a cloud-based technology that could enable affordable, fast bandwidth and ensure the survival of cloud networks in the event of system-wide failures. After years of work, scientists from AT&T, IBM and Applied Communication Sciences have announced a proof-of-concept technology that reduces setup times for cloud-to-cloud connectivity from days to seconds.

Study: Competitor keyword purchasing can backfire

July 14, 2014 1:06 pm | News | Comments

Firms buy specific keywords, including competitors’ brand names, on search engines such as Google or Bing to reach consumers searching for those words. Online advertisements employing such keywords are called search ads. This practice can backfire, however. A new study shows that any large difference in reputation between the two brand names is further magnified in the minds of consumers.

New effort to revolutionize time-keeping for cyber-physical systems

June 16, 2014 10:44 am | News | Comments

The National Science Foundation has announced a five-year, $4 million award to tackle the challenge of synchronizing time in cyber-physical systems, which are systems that integrate sensing, computation, control and networking into physical objects and infrastructure. The grant brings together expertise from five universities to improve the way computers maintain knowledge of time and synchronize it with other networked devices.

New computer program aims to teach itself everything about anything

June 13, 2014 11:11 am | by Michelle Ma, Univ. of Washington | Videos | Comments

Without a specific search term in mind, it can be surprisingly hard to find information on the Internet , or to know how to start searching. To help, computer scientists have created the first fully automated computer program that teaches everything there is to know about any visual concept. Called Learning Everything about Anything (LEVAN), the program searches millions of books and images to learn all possible variations of a concept.

Are squiggly lines the future of password security?

June 5, 2014 9:16 am | Videos | Comments

The need for robust password security has never been more critical than now, as people use smartphones or tablets to pay bills and store personal information. A new Rutgers study shows that free-form gestures can be used to unlock phones and grant access to apps. These gestures are less likely to be observed and reproduced than than traditional methods such as typed passwords.

Advertisement

Computer scientists develop tool to make the Internet of Things safer

June 3, 2014 9:40 am | by Ioana Patringenaru, Jacobs School of Engineering | News | Comments

Computer scientists at the Univ. of California, San Diego have developed a tool that allows hardware designers and system builders to test security—a first for the field. There is a big push to create the so-called Internet of Things, where all devices are connected and communicate with one another. As a result, embedded systems—small computer systems built around microcontrollers—are becoming more common.

First broadband wireless connection...to the Moon?

May 22, 2014 9:45 am | News | Comments

A demonstration by NASA and MIT engineers last fall showed, for first time, that a data communication technology exists that can provide space dwellers with the connectivity we all enjoy here on Earth. Next month, the team will present the first comprehensive overview of the performance of their laser-based communication uplink between the moon and Earth, which beat the previous record transmission speed last fall by a factor of 4,800.

A robust source of information on marine energy, offshore wind projects

May 22, 2014 8:04 am | by Tom Rickey, Pacific Northwest National Laboratory | News | Comments

Wondering what the impact on killer whales might be from a turbine installed under the sea? Curious whether crabs and other crustaceans might be attracted to underwater cables carrying electricity to homes and businesses on the mainland? Interested in which country is harvesting the most energy from the world's oceans? The answers to these and many more lie with Tethys.

The doctor’s in … through webcam, smartphone

May 13, 2014 7:49 am | News | Comments

Welcome to the virtual house call, the latest twist on telemedicine. It's increasingly getting attention as a way to conveniently diagnose simple maladies, such as whether that runny nose and cough is a cold or the flu. One company even offers a smartphone app that connects to a doctor. Patient groups and technology advocates are now pushing to expand this approach digital care to people with complex chronic diseases.

After slamming Google, Microsoft admits spying

March 21, 2014 12:41 pm | by Associated Press, Ryan Nakashima | News | Comments

Microsoft Corp., which has skewered rival Google Inc. for going through customer emails to deliver ads, has acknowledged that it searched emails in a blogger's Hotmail account to track down who was leaking company secrets. John Frank, deputy general counsel for Microsoft, which owns Hotmail, says in a statement that the software company "took extraordinary actions in this case."

Obama unleashing power of data on climate change

March 19, 2014 8:47 am | by Seth Borenstein, AP Science Writer | News | Comments

The White House on Wednesday announced an initiative to provide private companies and local governments better access to already public climate data. The idea is that with this localized data they can help the public understand the risks they face, especially in coastal areas. The government also is working with Google, Microsoft and Intel, to come up with tools to make communities more resilient in dealing with weather extremes.

Google cameras take rafting trip at Grand Canyon

March 14, 2014 10:03 am | by Felicia Fonseca, Associated Press | News | Comments

The 360-degree views of the Grand Canyon that went live Thursday in Google's Street View map option once were reserved largely for rafters who were lucky enough to board a private trip through the remote canyon, or those willing to pay big bucks to navigate its whitewater rapids. But a partnership with the advocacy group American Rivers has allowed to Google to take its all-seeing eyes down nearly 300 miles of rich geologic history.

Inventor of Web calls for digital bill of rights

March 12, 2014 8:50 am | Videos | Comments

The World Wide Web marks its 25th anniversary this year. On Wednesday, its inventor, Tim Berners-Lee, commented about the state of the Internet and about the need to defend principles that have made the Web successful. Named an R&D Scientist of the Year in 1996, Berners-Lee has been a long-time proponent of openness and neutrality on the Web.

U.S. network to scan workers with secret clearances

March 10, 2014 9:49 am | by Stephen Braun, Associated Press | News | Comments

Intelligence officials are planning a sweeping system of electronic monitoring that would tap into government, financial and other databases to scan the behavior of many of the 5 million federal employees with secret clearances. The system is intended to identify rogue agents, corrupt officials and leakers, in part to prevent cases similar to former National Security Agency analyst Edward Snowden.

Revamping R&D: The New Laboratory In Your Pocket?

March 10, 2014 9:06 am | by Paul Denny-Gouldson, Vice President, Solution Strategy, IDBS | Articles | Comments

The nature of science shares striking similarities across many industry verticals. Whether it’s biologics, chemicals or new product formulations, they are all performed with a high degree of similarity from company to company. This is exemplified by the fact that R&D informatics platforms such as LIMS, ELNs and SDMS are used, and provide real benefits in all science-related sectors.

Promise and peril in an ultra-connected world

March 3, 2014 11:41 am | by Anick Jesdanun, AP Technology Writer | News | Comments

We're in the beginning of a world in which everything is connected to the Internet and with one another, while powerful yet relatively cheap computers analyze all that data for ways to improve lives. At least that's the vision presented this past week at the Mobile World Congress wireless show in Barcelona, Spain, and some of that vision is already available or promised by the end of the year.

Push for Web addresses in era of search, apps

February 28, 2014 4:32 pm | by Anick Jesdanun, AP Technology Writer | News | Comments

In the early days, you typed in a domain name address to reach a website. Then came the ability to reach websites directly through a search engine. The mobile era brought us phone apps for accessing services without either. Why bother in this mobile-heavy era? Yet the organization in charge of Internet addresses is pushing a major expansion in domain name suffixes, and at least 160 suffixes have been added since October.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading