Named for the Greek word for wisdom, Sophia is a software sentry developed at Idaho National Laboratory that can passively monitor communication pathways in a static computer network and flag new types of conversations so operators can decide if a threat is present. It is the first such cybersecurity technology for SCADA control system network administrators that is being evaluated for deployment to industry.
Design for remotely monitoring large infrastructures, the longest fiber-optic sensor network yet designed would measure 250 km in length and be equipped with multiplexing technology to allow multiple information channels to be carried. Theorized by a researcher in Spain, the network would allow long-distance analysis with requiring a power source for the sensors.
As data centers continue to come under scrutiny for the amount of energy they use, researchers at University of Toronto Scarborough have a suggestion: turn the air conditioning down. Their latest research suggests that turning up the temperature could save energy with little or no increased risk of equipment failure.
As cloud computing is becoming more popular, new techniques to protect the systems must be developed. Computer scientists in Texas have developed a technique to automatically allow one computer in a virtual network to monitor another for intrusions, viruses or anything else that could cause a computer to malfunction. Dubbed “space travel”, the technique bridges the gap between computer hardware and software systems.
Engineering researchers at the University of Arkansas have received funding from the National Science Foundation to create distortion-tolerant communications for wireless networks that use very little power. The research will improve wireless sensors deployed in remote areas where these systems must rely on batteries or energy-harvesting devices for power.
Researchers at the Max Planck Institute in Germany have developed a complex network computer that is equally capable of performing arbitrary calculations as conventional computer, but does this under completely different conditions. Instead of a 0s and 1s in a binary system, this computer can in principle compute from, or be built from, any oscillating system, like a pendulum.
Males of the Japanese tree frog have learned not to use their calls at the same time so that the females can distinguish between them. Scientists at the Polytechnic University of Catalonia have used this form of calling behavior to create an algorithm that assigns colors to network nodes—an operation that can be applied to developing efficient wireless networks.
Modern research tools like supercomputers, particle colliders, and telescopes are generating so much data, so quickly, many scientists fear that soon they will not be able to keep up with the deluge. A team of computer researchers from universities and national laboratories are fighting to keep up, and have recently developed a tool that is able to query a massive 32 TB dataset in just 3 secs.
The U.S. Department of Energy Office of Science and the National Science Foundation have committed up to $27 million to Open Science Grid, a nine-member partnership extending the reach of distributed high-throughput computing networks.
Two years ago, a fledgling social-networking site called Blippy accidentally posted the credit card numbers of its users online. While that was a particularly egregious example, such inadvertent information leaks happen all the time. Massachusetts Institute of Technology researchers have developed a new programming system that could help prevent such inadvertent information leaks.
Research at Carlos III University in Madrid is developing an algorithm, based on ants' behavior when they are searching for food, which accelerates the search for relationships among elements that are present in social networks.
Northwestern University researchers are the first to discover that very different complex networks—ranging from global air traffic to neural networks—share very similar backbones. By stripping each network down to its essential nodes and links, they found each network possesses a skeleton and these skeletons share common features, much like vertebrates do.
Popular firewall technology designed to boost security on cellular networks can backfire, unwittingly revealing data that could help a hacker break into Facebook and Twitter accounts, a new study from the University of Michigan shows. The researchers also developed an Android app that tells phone users when they're on a vulnerable network.
Calculating the total capacity of a data network is a notoriously difficult problem. However, information theorists are beginning to make some headway. In a recently published paper, a team of information theorists have shown that in a wired network, network coding and error-correcting coding can be handled separately, without reduction in the network's capacity.
In the online struggle for network security, Kansas State University cybersecurity experts are adding an ally to the security force: the computer network itself. The team is researching the feasibility of building a computer network that could protect itself against online attackers by automatically changing its setup and configuration.
Many U.S. Internet service providers have fallen in line with their international counterparts in capping monthly residential broadband usage. But according to a recent study conducted with the help of Microsoft Research, these pricing models offer few tools for consumers to manage their data usage, and lead to uninformed decisions.
Using off-the-shelf parts, a researcher in Canada has created a Star Trek-like human-scale 3D videoconferencing pod that allows people in different locations to video conference as if they are standing in front of each other. Called TeleHuman, the device projects a full body image that is viewable from 360 degrees.
The international Square Kilometre Array (SKA) will be the world’s largest and most sensitive radio telescope when it is built, and will require the processing power of several million of today’s fastest computers to collect the exabytes of data it will generate. IBM and the Netherlands Institute for Radio Astronomy (ASTRON) are embarking on a five-year project to solve this data collection problem.
According to the International Centre for Radio Astronomy Research, the world’s most powerful telescope—the Square Kilometre Array—will produce on exabyte of data every day when it begins operation. Though still awaiting construction, scientists involved in SKA are already planning on how to deal with such a tremendous influx of information.
Konrad Juethner, a software engineering consultant, recently used Windows HPC Server to run cluster-based analysis with COMSOL Multiphysics using the hardware he had available at home. His successful setup highlights a high level of accessibility for advanced supercomputing approaches.
Researchers at Rochester Institute of Technology and PPC Corp., Syracuse, N.Y., have developed a new sensor that, once installed in the connecting units of coaxial cables, can find the exact location of cable damage through a technology called back scatter telemetry.
Researchers have set a new world record for data transfer, helping to usher in the next generation of high-speed network technology. At the SuperComputing 2011 conference, the international team transferred data in opposite directions at a combined rate of 186 Gbps in a wide-area network circuit.
According to Internet security software vendor Symantec, cyber attacks traced to China recently targeted at least 48 chemical and military-related companies in an effort to steal technical secrets. The victims included multiple Fortune 100 companies.
The high cost of keeping large data centers cool—and a need to expand its international presence—has prompted the social networking giant to launch plans to build a giant server farm in Sweden just 60 miles south of the Arctic Circle. Hydropower will supply the 120 MW needed to power the farm.
At the Georgia Tech Cyber Security Summit this week, researchers at the university released its latest report on the threats facing an interconnected world. Specific cyber threats include search poisoning, mobile web-based attacks, and stolen data used for marketing.