The U.S. Department of Energy Office of Science and the National Science Foundation have committed up to $27 million to Open Science Grid, a nine-member partnership extending the reach of distributed high-throughput computing networks.
Two years ago, a fledgling social-networking site called Blippy accidentally posted the credit card numbers of its users online. While that was a particularly egregious example, such inadvertent information leaks happen all the time. Massachusetts Institute of Technology researchers have developed a new programming system that could help prevent such inadvertent information leaks.
Research at Carlos III University in Madrid is developing an algorithm, based on ants' behavior when they are searching for food, which accelerates the search for relationships among elements that are present in social networks.
Northwestern University researchers are the first to discover that very different complex networks—ranging from global air traffic to neural networks—share very similar backbones. By stripping each network down to its essential nodes and links, they found each network possesses a skeleton and these skeletons share common features, much like vertebrates do.
Popular firewall technology designed to boost security on cellular networks can backfire, unwittingly revealing data that could help a hacker break into Facebook and Twitter accounts, a new study from the University of Michigan shows. The researchers also developed an Android app that tells phone users when they're on a vulnerable network.
Calculating the total capacity of a data network is a notoriously difficult problem. However, information theorists are beginning to make some headway. In a recently published paper, a team of information theorists have shown that in a wired network, network coding and error-correcting coding can be handled separately, without reduction in the network's capacity.
In the online struggle for network security, Kansas State University cybersecurity experts are adding an ally to the security force: the computer network itself. The team is researching the feasibility of building a computer network that could protect itself against online attackers by automatically changing its setup and configuration.
Many U.S. Internet service providers have fallen in line with their international counterparts in capping monthly residential broadband usage. But according to a recent study conducted with the help of Microsoft Research, these pricing models offer few tools for consumers to manage their data usage, and lead to uninformed decisions.
Using off-the-shelf parts, a researcher in Canada has created a Star Trek-like human-scale 3D videoconferencing pod that allows people in different locations to video conference as if they are standing in front of each other. Called TeleHuman, the device projects a full body image that is viewable from 360 degrees.
The international Square Kilometre Array (SKA) will be the world’s largest and most sensitive radio telescope when it is built, and will require the processing power of several million of today’s fastest computers to collect the exabytes of data it will generate. IBM and the Netherlands Institute for Radio Astronomy (ASTRON) are embarking on a five-year project to solve this data collection problem.
According to the International Centre for Radio Astronomy Research, the world’s most powerful telescope—the Square Kilometre Array—will produce on exabyte of data every day when it begins operation. Though still awaiting construction, scientists involved in SKA are already planning on how to deal with such a tremendous influx of information.
Konrad Juethner, a software engineering consultant, recently used Windows HPC Server to run cluster-based analysis with COMSOL Multiphysics using the hardware he had available at home. His successful setup highlights a high level of accessibility for advanced supercomputing approaches.
Researchers at Rochester Institute of Technology and PPC Corp., Syracuse, N.Y., have developed a new sensor that, once installed in the connecting units of coaxial cables, can find the exact location of cable damage through a technology called back scatter telemetry.
Researchers have set a new world record for data transfer, helping to usher in the next generation of high-speed network technology. At the SuperComputing 2011 conference, the international team transferred data in opposite directions at a combined rate of 186 Gbps in a wide-area network circuit.
According to Internet security software vendor Symantec, cyber attacks traced to China recently targeted at least 48 chemical and military-related companies in an effort to steal technical secrets. The victims included multiple Fortune 100 companies.
The high cost of keeping large data centers cool—and a need to expand its international presence—has prompted the social networking giant to launch plans to build a giant server farm in Sweden just 60 miles south of the Arctic Circle. Hydropower will supply the 120 MW needed to power the farm.
At the Georgia Tech Cyber Security Summit this week, researchers at the university released its latest report on the threats facing an interconnected world. Specific cyber threats include search poisoning, mobile web-based attacks, and stolen data used for marketing.
Using millions of Twitter subscribers as living "sensors," engineers from Rice University and Motorola Mobility have found a way to monitor fans’ levels of excitement and to keep track of the action in National Football League (NFL) games, without ever switching on a TV.
Detailed views of star formation in the Antennae galaxies are the first astronomical test images released to the public from the Atacama Large Millimeter/submillimeter Array (ALMA) in Chile. Scheduled for completion in 2012, the array will look into the early history of the Universe and provide a better look at local planets and stars.
Massachusetts Institute of Technology researchers have created a new Urban Network Analysis (UNA) toolbox that enables urban designers and planners to describe the spatial patterns of cities using mathematical network analysis methods. Such tools can support better informed and more resilient urban design and planning in a context of rapid urbanization.
Physicists at The City College of New York have found a new way to map spiraling light that could help harness untapped data channels in optical fibers. The new model, called a Higher Order Poincaré Sphere, could also advance quantum computing.
Researchers from Massachusetts Institute of Technology and Princeton University developed a system that uses a network of smartphones mounted on car dashboards to collect information about traffic signals and tell drivers when slowing down could help them avoid waiting at lights. By reducing the need to idle and accelerate from a standstill, the system saves gas.
Until recently, medical files belonging to nearly 300,000 Californians sat unsecured on the Internet for the entire world to see. The leak was not brought about by a hacker, however, just a company’s neglect. Experts worry that such mistakes could hinder the transition of medical records to digital form.
Drivers are generally concerned with tracking their own location in two dimensions, but the third dimension of altitude has always been available through GPS, just with lower accuracy than that of the horizontal coordinates. A new software solution brings centimeter-scale positioning to this neglected dimension.
CERN is looking few good FLOPS it can leverage to run more simulations of high-energy particle physics. These simulations, which are submitted to a central database from the user’s home computers, will provide scientists with theoretical references for measurements obtained at accelerators like the Large Hadron Collider.