During this week’s Intel Developer Forum, new Intel CEO Brian Krzanich announced a number of near-term changes for the company’s product line, including new LTE and 14-nm products, and a lower-power product family called Quark directed at future wearable electronics devices.
Those separated from family and friends by long distances often use video conferencing services such as Skype in order to see each other when talking. But who hasn’t experienced the frustration of your counterpart not making direct eye contact during the conversation? A software prototype from the laboratories ETH Zurich may be able to help by leveraging the color and depth information made available by XBox Kinect cameras.
The combined computing power of 200,000 private PCs helps astronomers take an inventory of the Milky Way. The Einstein@Home project connects home and office PCs of volunteers from around the world to a global supercomputer. Using this computer cloud, an international team analyzed archival data to discover 24 pulsars which has been previously missed by astronomers.
Data can be a challenge for many scientists, including entomologists. From bumblebees to blister beetles, the world-class Univ. of Kansas entomology collection numbers 5 million insects pinned in drawers, each one with a tiny printed or handwritten label. A web-accessible and searchable database called Specify has been implemented to help digitize this massive collection.
Univ. of Washington researchers have performed what they believe is the first noninvasive human-to-human brain interface, with one researcher able to send a brain signal via the Internet to control the hand motions of a fellow researcher. Using electrical brain recordings and a form of magnetic stimulation, Rajesh Rao sent a brain signal to Andrea Stocco on the other side of campus, causing Stocco’s finger to move on a keyboard.
Now that the Internet’s basic protocols are more than 30 years old, network scientists are increasingly turning their attention to ad hoc networks where unsolved problems still abound. Most theoretical analyses of ad hoc networks have assumed that the communications links within the network are stable. But that often isn’t the case with real-world wireless devices.
Android smartphone users will soon have a chance to participate in important scientific research every time they charge their phones. Using a new app created by researchers at the Univ. of California, Berkeley, users will be able to donate a phone’s idle computing power to crunch numbers for projects that could lead to breakthroughs ranging from novel medical therapies to the discovery of new stars.
TCP, the transmission control protocol, is one of the core protocols governing the Internet: If counted as a computer program, it's the most widely used program in the world. One of its main roles is to prevent computer congestion. A new computer system, dubbed Remy, automatically generates TCP congestion-control algorithms that control network congestion at transmission rates two to three times as high as human-derived algorithms.
Researchers at Columbia Univ. School of Nursing have found that electronic health record (EHR) system to automate the immunization data shared between health providers and public health agencies enables physicians to assist individual patients faster and more effectively, while also providing more immediate, cohesive community data to the agencies tasked with promoting public health.
China's population of Internet users has grown to 591 million, driven by a 20% rise over the past year in the number of people who surf the Web from smartphones and other wireless devices, an industry group reported Wednesday. The rise of Web use has driven the growth of new Chinese industries from online shopping and microblogs to online video.
American information is so valuable, experts say, that no amount of global outrage over secret U.S. surveillance powers would cause Britain, Canada, Australia and New Zealand to ditch their collaborative spying arrangement: the Five Eyes. Revelations from NSA leaker Edward Snowden, they say, are unlikely to stop or even slow the global growth of secret-hunting—an increasingly critical factor in the security and prosperity of nations.
Researchers in the U.K. have demonstrated for the first time incredibly short optical response rates using graphene. Ordinarily, optical switches respond at rate of a few picoseconds. Through this study physicists have observed the response rate of an optical switch using ‘few layer graphene’ to be around one hundred femtoseconds—nearly a hundred times quicker.
Researchers of the Univ. of Stuttgart have achieved a new world record in coupling efficiency between optical fibers and integrated silicon waveguides. The breakthrough, which resulted in a coupling efficiency of 87%, was based on newly developed aperiodic grating coupler structures optimized at the nanoscale.
US Ignite's Next-Generation Application Summit is convening in Chicago this week, a year after the administration announced US Ignite, an initiative comprising public and private partners seeking to jumpstart gigabit application development that can take advantage of advanced networks. Twenty-two winning “apps”, highlighted by Mozilla and the National Science Foundation, are being featured at the summit.
A computer engineer in Spain has been developing new image thresholding algorithms to greatly speed the process of image magnification without compromising image quality. Images transferred over the Internet are often reduced; restoring them to their former quality requires complex mathematical routines, many of which are time-consuming. The faster algorithm could affect a wide variety of imaging routines, such fingerprints or MRI scans.
Eighteen months in the works, the top-secret project was announced Saturday in New Zealand, where up to 50 volunteer households are already beginning to receive the Internet briefly on their home computers via translucent helium balloons that sail by on the wind 12 miles above Earth. Google is launching these Internet-beaming antennas into the stratosphere aboard giant, jellyfish-shaped balloons.
The top U.S. intelligence official stressed Saturday that a previously undisclosed program for tapping into Internet usage is authorized by Congress, falls under strict supervision of a secret court and cannot intentionally target an American citizen. He decried the revelation of that and another intelligence-gathering program as reckless.
After years of quiet and largely unsuccessful diplomacy, the U.S. has brought its persistent computer-hacking problems with China into the open, delivering a steady drumbeat of reports accusing Beijing's government and military of computer-based attacks against America. Officials say the new strategy may be having some impact.
Forget to turn off the lights before leaving the apartment? No problem. Just raise your hand, finger-swipe the air, and your lights will power down. Using the common Wi-Fi signals generated by a commercial router, University of Washington computer scientists have developed gesture-recognition technology that brings this a step closer to reality.
While officials have been warning for years about China's cyber espionage efforts aimed at U.S. military and high-tech programs, the breadth of new revelations about the extent of cyberattacks will increase pressure on American leaders to take more strident action against Beijing to stem the persistent breaches.
Bitcoins are a virtual currency whose oscillations have pulled geeks and speculators alike through stomach-churning highs and lows. But an increasing number of transactions—up to 70,000 each day over the past month—that have propelled bitcoins from the world of Internet oddities to the cusp of mainstream use, a remarkable breakthrough for a currency which made its online debut only four years ago.
The agency that oversees Internet domain names says it will open a satellite office in China, home of the world's largest Internet population. Monday's announcement comes as the Internet Corporation for Assigned Names and Numbers holds its spring meeting in Beijing this week.
In today's laboratories, experimental data sets are growing larger, and critical tasks such as data storage, processing, mining, and sharing have become cumbersome, error prone, and expensive. The i3D Enterprise Service, offered by Shimadzu Scientific Instruments and Integrated Analysis Inc., overcomes these challenges by integrating storage, processing, and data mining in an enterprise-level private cloud.
We live in the post-genomic era, when DNA sequence data is growing exponentially. However, for most of the genes that we identify, we have no idea of their biological functions. They are like words in a foreign language, waiting to be deciphered. A new project called CAFA, for Critical Assessment of Function Annotation, is helping channel the flood of data from genome research to deduce the function of proteins.
Even cyberwar has rules, and one group of experts is putting out a manual to prove it. Their handbook, the Tallinn Manual, due to be published later this week, applies the practice of international law to the world of electronic warfare in an effort to show how hospitals, civilians and neutral nations can be protected in an information-age fight.