Cuba apparently has finally switched on the first undersea fiber-optic cable linking it to the outside world nearly two years after its arrival, according to analysis by a company that monitors global Internet use. In a report posted Sunday on the website of Renesys, author Doug Madory wrote that Cuba began using the ALBA-1 cable on Jan. 14.
The U.S. Department of Energy's National Renewable Energy Laboratory has created an energy analysis tool to help individuals and educators experiment with future energy use scenarios. The interactive Buildings, Industry, Transportation, Electricity, and Transportation Scenarios (BITES) allows users to explore how changes in energy demand and supply can impact carbon dioxide emissions and the current U.S. energy trajectory.
In today's engineering environment, information literacy is essential for those preparing to enter the workplace. As more experienced engineers retire, incoming engineers increasingly have to solve problems without easy access to mentors and peers who may have the insight and information the beginners need. While graduates would like to ask advice from a more experienced colleague, they increasingly turn to other sources for help.
In the quest for networking quantum systems and eventually building a quantum Internet—where photons carry information—color conversion will be crucial. Researchers at the University of Oregon have done this optical conversion with a mechanical oscillator. Their invention manages to avoid the interrupting effects of thermal mechanical vibrations.
A new study by Northwestern University researchers has revealed that public domain name services (DNS) could actually slow down users’ web-surfing experience. As a result, researchers have developed a solution to help avoid such an impact: a tool called “namehelp” that could speed web performance by 40%.
Through a new website unveiled Wednesday, Google is opening a virtual window into the secretive data centers where an intricate maze of computers process Internet search requests, show YouTube video clips, and distribute email for millions of people. The photographic access to Google's data centers coincides with the publication of a Wired magazine article about how the company builds and operates them.
A group of researchers have proposed creating a new Web-based data network to help researchers and policymakers worldwide turn existing knowledge into real-world applications and technologies and improve science and innovation policy.
No longer limited to narrow focus groups, painstaking in-person surveys, or artificially controlled studies, researchers today have a far easier time compiling and manipulating large data sets. At the same time, however, sharing such data can be fraught with risks. Researchers with the “Privacy Tools for Sharing Research Data” project at Harvard University aim to keep the flexibility and convenience of sharing large amounts of data while more fully protecting individual privacy.
If you were a bacterium, the virus M13 might seem innocuous enough. It insinuates more than it invades, setting up shop like a freeloading house guest, not a killer. Once inside it makes itself at home, eating your food, texting indiscriminately. Recently, however, bioengineers at Stanford University have given M13 a bit of a makeover; they have parasitized the parasite and harnessed M13's key attributes to create what might be termed as the biological Internet, or "Bi-Fi."
This week, an open innovation challenge called Mozilla Ignite announced eight winning ideas for innovative applications that offer a glimpse of what the Internet's future might look like, and what the lives of Americans may look like as well. The challenge called for stellar application, or "app," ideas from anywhere in the world that would advance national priorities such as health care, public safety, clean energy, and transportation.
Most major Websites maintain huge databases. Almost any transaction on a shopping site, travel site, or social networking site require multiple database queries, which can slow response time. Now, researchers at Massachusetts Institute of Technology have developed a system that automatically streamlines Websites' database access patterns, making the sites up to three times as fast.
A collaboration between a Stanford University ant biologist and a computer scientist has revealed that the behavior of harvester ant as they forage for food mirrors the protocols that control traffic on the Internet.
Northwestern University scientists have connected 250 years of organic chemical knowledge into one giant computer network—a chemical Google on steroids. A decade in the making, the software optimizes syntheses of drug molecules and other important compounds and combines long (and expensive) syntheses of compounds into shorter and more economical routes.
When it comes to delivering data to users, the Web still works brilliantly. But for other functions such as allowing users to move between wireless networks or companies to shift traffic among servers, engineers are forced to implement increasingly cumbersome tweaks. A team of Princeton University researchers has released a plan to cut through that tangle and provide a simple solution to many of the problems involved with the Internet's growing pains.
Researchers have developed a new computational method that will make it easier for scientists to identify and prioritize genes, drug targets, and strategies for repositioning drugs that are already on the market. By mining large datasets more simply and efficiently, researchers will be able to better understand genomic and proteomics interactions, as well as identify fellow researchers with whom they can collaborate.
Do you have what it takes to be an ethical hacker? Can you step into the shoes of a professional paid to outsmart supposedly locked-down systems? "Control-Alt-Hack", a new card game developed by University of Washington computer scientists, gives teenage and young-adult players a taste of what it means to be a computer-security professional defending against an ever-expanding range of digital threats.
Medical devices save countless lives, and increasingly functions such as data storage and wireless communication allow for individualized patient care and other advances. But after their recent study, an interdisciplinary team of medical researchers and computer scientists warn that federal regulators need to improve how they track security and privacy problems in medical devices.
IBM Research scientists this week unveiled a first-of-a-kind augmented reality mobile shopping app that will make it possible for consumers to pan store shelves and receive personalized product information, recommendations and coupons while they browse shopping aisles.
The Secure Shell, or SSH, is a popular program that lets computer users log onto remote machines. First release in 1995, SSH was designed for an Internet consisting of stationary machines, and it hasn't evolved with the mobile Internet. It also can't handle roaming. Now, a team of Massachusetts Institute of Technology researchs have developed a new remote-login program called Mosh, for mobile shell, which solves many of SSH's problems.
Shimi, a musical companion developed by Georgia Tech’s Center for Music Technology, recommends songs, dances to the beat and keeps the music pumping based on listener feedback. Powered by an Android phone, the robot is also app-based, meaning it can perform other functions, such as face recognition, based on the type of software programmed for it.
Although comparable migration data is available for almost every country of the world, until recently records were incompatible between nations. Information about gender and age was nonexistent. Researchers have now compiled the global flow of millions of e-mails and have discovered global migration trends contained in the data.
Wi-Fi is reaching its technical limits. Its efficiency drops significantly in busy surroundings where many different networks and numerous wireless Internet-enabled devices are operating. In some cases, it may even drop to less than 20%.
Computer scientists at the University of Glasgow are participating in a new project to develop a search engine which will draw its results from sensors located in the physical world.
According to recent data released by Google, the search engine giant has logged more than 2.5 million requests in the last 11 months to remove links believed to be violating Microsoft’s copyrights. This exceeded the number of complaints about material produced by entertainment companies pushing for tougher online piracy laws.
As malware threats expand into new domains and increasingly focus on industrial espionage, Georgia Institute of Technology researchers are launching a new weapon to help battle the threats: A malware intelligence system that will help corporate and government security officials share information about the attacks they are fighting.