TCP, the transmission control protocol, is one of the core protocols governing the Internet: If counted as a computer program, it's the most widely used program in the world. One of its main roles is to prevent computer congestion. A new computer system, dubbed Remy, automatically generates TCP congestion-control algorithms that control network congestion at transmission rates two to three times as high as human-derived algorithms.
Researchers at Columbia Univ. School of Nursing have found that electronic health record (EHR) system to automate the immunization data shared between health providers and public health agencies enables physicians to assist individual patients faster and more effectively, while also providing more immediate, cohesive community data to the agencies tasked with promoting public health.
China's population of Internet users has grown to 591 million, driven by a 20% rise over the past year in the number of people who surf the Web from smartphones and other wireless devices, an industry group reported Wednesday. The rise of Web use has driven the growth of new Chinese industries from online shopping and microblogs to online video.
American information is so valuable, experts say, that no amount of global outrage over secret U.S. surveillance powers would cause Britain, Canada, Australia and New Zealand to ditch their collaborative spying arrangement: the Five Eyes. Revelations from NSA leaker Edward Snowden, they say, are unlikely to stop or even slow the global growth of secret-hunting—an increasingly critical factor in the security and prosperity of nations.
Researchers in the U.K. have demonstrated for the first time incredibly short optical response rates using graphene. Ordinarily, optical switches respond at rate of a few picoseconds. Through this study physicists have observed the response rate of an optical switch using ‘few layer graphene’ to be around one hundred femtoseconds—nearly a hundred times quicker.
Researchers of the Univ. of Stuttgart have achieved a new world record in coupling efficiency between optical fibers and integrated silicon waveguides. The breakthrough, which resulted in a coupling efficiency of 87%, was based on newly developed aperiodic grating coupler structures optimized at the nanoscale.
US Ignite's Next-Generation Application Summit is convening in Chicago this week, a year after the administration announced US Ignite, an initiative comprising public and private partners seeking to jumpstart gigabit application development that can take advantage of advanced networks. Twenty-two winning “apps”, highlighted by Mozilla and the National Science Foundation, are being featured at the summit.
A computer engineer in Spain has been developing new image thresholding algorithms to greatly speed the process of image magnification without compromising image quality. Images transferred over the Internet are often reduced; restoring them to their former quality requires complex mathematical routines, many of which are time-consuming. The faster algorithm could affect a wide variety of imaging routines, such fingerprints or MRI scans.
Eighteen months in the works, the top-secret project was announced Saturday in New Zealand, where up to 50 volunteer households are already beginning to receive the Internet briefly on their home computers via translucent helium balloons that sail by on the wind 12 miles above Earth. Google is launching these Internet-beaming antennas into the stratosphere aboard giant, jellyfish-shaped balloons.
The top U.S. intelligence official stressed Saturday that a previously undisclosed program for tapping into Internet usage is authorized by Congress, falls under strict supervision of a secret court and cannot intentionally target an American citizen. He decried the revelation of that and another intelligence-gathering program as reckless.
After years of quiet and largely unsuccessful diplomacy, the U.S. has brought its persistent computer-hacking problems with China into the open, delivering a steady drumbeat of reports accusing Beijing's government and military of computer-based attacks against America. Officials say the new strategy may be having some impact.
Forget to turn off the lights before leaving the apartment? No problem. Just raise your hand, finger-swipe the air, and your lights will power down. Using the common Wi-Fi signals generated by a commercial router, University of Washington computer scientists have developed gesture-recognition technology that brings this a step closer to reality.
While officials have been warning for years about China's cyber espionage efforts aimed at U.S. military and high-tech programs, the breadth of new revelations about the extent of cyberattacks will increase pressure on American leaders to take more strident action against Beijing to stem the persistent breaches.
Bitcoins are a virtual currency whose oscillations have pulled geeks and speculators alike through stomach-churning highs and lows. But an increasing number of transactions—up to 70,000 each day over the past month—that have propelled bitcoins from the world of Internet oddities to the cusp of mainstream use, a remarkable breakthrough for a currency which made its online debut only four years ago.
The agency that oversees Internet domain names says it will open a satellite office in China, home of the world's largest Internet population. Monday's announcement comes as the Internet Corporation for Assigned Names and Numbers holds its spring meeting in Beijing this week.
Malware shut down 32,000 computers and servers at three major South Korean TV networks and three banks last Wednesday, disrupting communications and banking businesses, officials said. Investigators have yet to pinpoint the culprit, but the focus remains fixed on North Korea, where South Korean security experts say Pyongyang has been training a team of computer-savvy "cyber warriors" as cyberspace becomes a fertile battleground in the standoff between the two Koreas.
In today's laboratories, experimental data sets are growing larger, and critical tasks such as data storage, processing, mining, and sharing have become cumbersome, error prone, and expensive. The i3D Enterprise Service, offered by Shimadzu Scientific Instruments and Integrated Analysis Inc., overcomes these challenges by integrating storage, processing, and data mining in an enterprise-level private cloud.
We live in the post-genomic era, when DNA sequence data is growing exponentially. However, for most of the genes that we identify, we have no idea of their biological functions. They are like words in a foreign language, waiting to be deciphered. A new project called CAFA, for Critical Assessment of Function Annotation, is helping channel the flood of data from genome research to deduce the function of proteins.
Even cyberwar has rules, and one group of experts is putting out a manual to prove it. Their handbook, the Tallinn Manual, due to be published later this week, applies the practice of international law to the world of electronic warfare in an effort to show how hospitals, civilians and neutral nations can be protected in an information-age fight.
A variety of solid-state systems are currently being investigated as candidates for quantum bits of information, or qubits. One such qubit, a quantum dot, is made of semiconductor nanocrystals embedded in a chip, but the quality of photons generated from solid-state qubits can be low due to decoherence. Now, researchers in the U.K. have generated single photons with tailored properties from solid-state devices that are identical in quality to lasers
One of the government's top spy agencies, the National Security Agency, has teamed with Carnegie Mellon University to interest high school students in a game of computer hacking. Their goal with "Toaster Wars" is to cultivate the nation's next generation of cyber warriors. The free, online "high school hacking competition" is scheduled to run from April 26 to May 6, and any U.S. student or team in grades six through 12 can apply and participate.
A Canadian research center said Wednesday that it had identified 25 different countries that host servers linked to FinFisher, a Trojan horse program which can dodge anti-virus protections to steal data, log keystrokes, eavesdrop on Skype calls, and turn microphones and webcams into live surveillance devices. This finding doesn't necessarily mean those countries' governments are using FinFisher, but it is an indication of the spyware's reach.
Encrypting a message with a strong code is the only safe way to keep your communications secret, but it will be obvious to anyone seeing such a message that the sender is hiding something. Steganography, on the other hand, can hide a secret message in plain sight, using binary numbers, for example. Researchers, however, now suggest that instead of using a humdrum text document and modifying it in a codified way to embed a secret message, correspondents could use a joke to hide their true meaning.
Computer scientists at the University of California, San Diego, and Google have developed a novel approach that allows the massive infrastructure powering cloud computing as much as 15 to 20% more efficiently. This novel model has already been applied at Google.
A new guide for Web developers recently released by NIST will make it easier for electric utilities and vendors to give customers convenient, electronic access to their energy usage data with tools and applications developed as part of the new "Green Button" initiative.