Advertisement
Networking
Subscribe to Networking
View Sample

FREE Email Newsletter

New software is like a Rosetta Stone for spectrometry data

October 9, 2012 3:46 pm | News | Comments

After leading mass spectrometer manufacturers agreed to license technology that has enabled researchers to develop software allows scientists to easily use and share research data collected across proprietary instrument platforms. Called the ProteoWizard Toolkit, this cross-platform set of libraries and applications is expected to bolster large-scale biological research and help improve the understanding of complex diseases like cancer.

New software tool helps utilities monitor for network security

October 9, 2012 9:35 am | News | Comments

Named for the Greek word for wisdom, Sophia is a software sentry developed at Idaho National Laboratory that can passively monitor communication pathways in a static computer network and flag new types of conversations so operators can decide if a threat is present. It is the first such cybersecurity technology for SCADA control system network administrators that is being evaluated for deployment to industry.

Research describes longest fiber-optic sensor network yet

October 1, 2012 7:57 am | News | Comments

Design for remotely monitoring large infrastructures, the longest fiber-optic sensor network yet designed would measure 250 km in length and be equipped with multiplexing technology to allow multiple information channels to be carried. Theorized by a researcher in Spain, the network would allow long-distance analysis with requiring a power source for the sensors.

Advertisement

Hotter might be better at energy-intensive data centers

September 26, 2012 4:43 am | News | Comments

As data centers continue to come under scrutiny for the amount of energy they use, researchers at University of Toronto Scarborough have a suggestion: turn the air conditioning down. Their latest research suggests that turning up the temperature could save energy with little or no increased risk of equipment failure.

“Space travel” gives computers a more powerful way to detect threats

September 21, 2012 5:46 am | News | Comments

As cloud computing is becoming more popular, new techniques to protect the systems must be developed. Computer scientists in Texas have developed a technique to automatically allow one computer in a virtual network to monitor another for intrusions, viruses or anything else that could cause a computer to malfunction. Dubbed “space travel”, the technique bridges the gap between computer hardware and software systems.

Building ultralow power wireless networks

August 29, 2012 4:16 am | News | Comments

Engineering researchers at the University of Arkansas have received funding from the National Science Foundation to create distortion-tolerant communications for wireless networks that use very little power. The research will improve wireless sensors deployed in remote areas where these systems must rely on batteries or energy-harvesting devices for power.

An entirely new principle for information processing

August 15, 2012 8:10 am | News | Comments

Researchers at the Max Planck Institute in Germany have developed a complex network computer that is equally capable of performing arbitrary calculations as conventional computer, but does this under completely different conditions. Instead of a 0s and 1s in a binary system, this computer can in principle compute from, or be built from, any oscillating system, like a pendulum.

Frog calls inspire new algorithm for wireless networks

July 17, 2012 7:02 am | News | Comments

Males of the Japanese tree frog have learned not to use their calls at the same time so that the females can distinguish between them. Scientists at the Polytechnic University of Catalonia have used this form of calling behavior to create an algorithm that assigns colors to network nodes—an operation that can be applied to developing efficient wireless networks.

Advertisement

Sifting through a trillion electrons

June 26, 2012 11:36 am | by Linda Vu | News | Comments

Modern research tools like supercomputers, particle colliders, and telescopes are generating so much data, so quickly, many scientists fear that soon they will not be able to keep up with the deluge. A team of computer researchers from universities and national laboratories are fighting to keep up, and have recently developed a tool that is able to query a massive 32 TB dataset in just 3 secs.

$27 million award bolsters research computing grid

June 21, 2012 9:33 am | News | Comments

The U.S. Department of Energy Office of Science and the National Science Foundation have committed up to $27 million to Open Science Grid, a nine-member partnership extending the reach of distributed high-throughput computing networks.

Making it easier to build secure Web applications

June 18, 2012 9:30 am | by Larry Hardesty, MIT News Office | News | Comments

Two years ago, a fledgling social-networking site called Blippy accidentally posted the credit card numbers of its users online. While that was a particularly egregious example, such inadvertent information leaks happen all the time. Massachusetts Institute of Technology researchers have developed a new programming system that could help prevent such inadvertent information leaks.

A search engine for social networks based on ants

June 4, 2012 9:05 am | News | Comments

Research at Carlos III University in Madrid is developing an algorithm, based on ants' behavior when they are searching for food, which accelerates the search for relationships among elements that are present in social networks.

Complex networks, animal or computer, share similar skeletons

June 4, 2012 3:48 am | News | Comments

Northwestern University researchers are the first to discover that very different complex networks—ranging from global air traffic to neural networks—share very similar backbones. By stripping each network down to its essential nodes and links, they found each network possesses a skeleton and these skeletons share common features, much like vertebrates do.

Advertisement

Cell network security holes revealed

May 21, 2012 7:59 am | News | Comments

Popular firewall technology designed to boost security on cellular networks can backfire, unwittingly revealing data that could help a hacker break into Facebook and Twitter accounts, a new study from the University of Michigan shows. The researchers also developed an Android app that tells phone users when they're on a vulnerable network.

The elusive capacity of networks

May 15, 2012 4:02 am | by Larry Hardesty, MIT News Office | News | Comments

Calculating the total capacity of a data network is a notoriously difficult problem. However, information theorists are beginning to make some headway. In a recently published paper, a team of information theorists have shown that in a wired network, network coding and error-correcting coding can be handled separately, without reduction in the network's capacity.

Cybersecurity experts investigate self-adapting computer network

May 10, 2012 8:26 am | News | Comments

In the online struggle for network security, Kansas State University cybersecurity experts are adding an ally to the security force: the computer network itself. The team is researching the feasibility of building a computer network that could protect itself against online attackers by automatically changing its setup and configuration.

Study: Bandwidth caps create uncertainty, risky decisions

May 7, 2012 7:26 am | News | Comments

Many U.S. Internet service providers have fallen in line with their international counterparts in capping monthly residential broadband usage. But according to a recent study conducted with the help of Microsoft Research, these pricing models offer few tools for consumers to manage their data usage, and lead to uninformed decisions.

Life-size, 3D hologram-like telepods may change videoconferencing

May 4, 2012 5:37 am | News | Comments

Using off-the-shelf parts, a researcher in Canada has created a Star Trek-like human-scale 3D videoconferencing pod that allows people in different locations to video conference as if they are standing in front of each other. Called TeleHuman, the device projects a full body image that is viewable from 360 degrees.

ASTRON and IBM collaborate to explore origins of the universe

April 2, 2012 5:19 am | News | Comments

The international Square Kilometre Array (SKA) will be the world’s largest and most sensitive radio telescope when it is built, and will require the processing power of several million of today’s fastest computers to collect the exabytes of data it will generate. IBM and the Netherlands Institute for Radio Astronomy (ASTRON) are embarking on a five-year project to solve this data collection problem.

Astronomers brace for data deluge

February 13, 2012 7:08 am | News | Comments

According to the International Centre for Radio Astronomy Research, the world’s most powerful telescope—the Square Kilometre Array—will produce on exabyte of data every day when it begins operation. Though still awaiting construction, scientists involved in SKA are already planning on how to deal with such a tremendous influx of information.

Case study: Advanced cluster simulations, on the fly

January 9, 2012 3:12 am | White Papers

Konrad Juethner, a software engineering consultant, recently used Windows HPC Server to run cluster-based analysis with COMSOL Multiphysics using the hardware he had available at home. His successful setup highlights a high level of accessibility for advanced supercomputing approaches.

'Smart Connector' senses failure in radio-frequency cables

December 15, 2011 11:26 am | News | Comments

Researchers at Rochester Institute of Technology and PPC Corp., Syracuse, N.Y., have developed a new sensor that, once installed in the connecting units of coaxial cables, can find the exact location of cable damage through a technology called back scatter telemetry.

High-energy physicists set record for network data transfer

December 13, 2011 3:10 am | News | Comments

Researchers have set a new world record for data transfer, helping to usher in the next generation of high-speed network technology. At the SuperComputing 2011 conference, the international team transferred data in opposite directions at a combined rate of 186 Gbps in a wide-area network circuit.

Security firm: Hackers hit chemical companies

November 1, 2011 11:06 am | by Joe McDonald, AP Business Writer | News | Comments

According to Internet security software vendor Symantec, cyber attacks traced to China recently targeted at least 48 chemical and military-related companies in an effort to steal technical secrets. The victims included multiple Fortune 100 companies.

Arctic chill brings Facebook data center to Sweden

October 27, 2011 7:13 am | by Karl Ritter, Associated Press | News | Comments

The high cost of keeping large data centers cool—and a need to expand its international presence—has prompted the social networking giant to launch plans to build a giant server farm in Sweden just 60 miles south of the Arctic Circle. Hydropower will supply the 120 MW needed to power the farm.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading