A renowned technology hub that is home to some of the country's top universities, Boston is emerging as an unlikely battleground for web-based businesses like Airbnb and Uber, with some saying more regulations are needed to prevent the upstarts from disrupting more established industries. Cities like Boston have been wrestling with the same questions and developing solutions ranging from outright bans to minimum safety requirements.
As U.S. energy imports dramatically drop it would appear that renewables investment is in jeopardy, including the biofuels market. There’s some evidence to support this; but if declining or stalled investment is predicated on the limited potential of existing technology, much of which still relies on biomass, the biofuels industry may, in fact, be undergoing a natural transition instead of a decline.
Biochemists in California have developed a program that predicts the placement of chemical marks that control the activity of genes based on sequences of DNA. By comparing sequences with and without epigenomic modification, the researchers identified DNA patterns associated with the changes. They call this novel analysis pipeline Epigram and have made both the program and the DNA motifs they identified openly available to other scientists.
Washington State Univ. professor Rich Lamb has figured out a dramatically easier and more cost-effective way to do research on science curriculum in the classroom, and it could include playing video games. Called “computational modeling,” it involves a computer “learning” student behavior and then “thinking” as students would. Lamb, who teaches science education, says the process could revolutionize the way educational research is done.
Sandia National Laboratories’ Institutional Transformation (IX) model helps the federal laboratory reduce its energy consumption and could help other large institutions do the same. The IX model allows planners to experiment with energy conservation measures before making expensive changes. It also models operations-oriented conservation methods.
Imagine being able to switch out the batteries in electric cars just like you switch out batteries in a photo camera or flashlight. Engineers in California are trying to accomplish just that, in partnership with a local San Diego engineering company. Rather than swapping out the whole battery, which is cumbersome and requires large, heavy equipment, engineers plan to swap out and recharge smaller units within the battery, known as modules.
Microsoft is giving its MSN news service a crisper look, new lifestyle tools and seamless syncing across devices. The company says the revamped site fits in with Microsoft's overall strategy of making mobile phones and Internet-based services priorities as its traditional businesses—Windows and Office software installed on desktops—slow down or decline.
Proofs are the key method of mathematics. Until now, it has mainly been humans who have verified whether proofs are correct. This could change, says Russian mathematician Vladimir Voevodsky, who points to evidence that, in the near future, computers rather than humans could reliably verify whether a mathematical proof is correct.
Today, big data is a hot topic within almost every industry. May saw the biggest ever European technologists conference on big data, Berlin Buzzwords, while the likes of O'Reilly's Strata conference pull in huge numbers of attendees keen to learn how to adapt to this new world. Despite all the interest, a great deal of confusion remains around big data.
A new white paper from Decision Lens teaches how world-class innovation teams create standard frameworks to evaluate and prioritize the strategic investments that deliver the highest returns on investment, streamlining and accelerating the R&D portfolio planning process.
Sandia National Laboratories’ Goma 6.0 is software for numerical simulation of multiphysics continuum processes, including moving geometry, phase-change, fluid-structural interactions, complex rheology and chemical reactions. It solves the fundamental equations of mass, momentum, energy and chemical species transport using the finite element method (FEM), which can be described by partial differential equations.
Modeling and simulation is standard practice in nearly every scientific field. Idaho National Laboratory’s Multiphysics Object Oriented Simulation Environment (MOOSE) has transformed approaches to predictive simulation, making it quick, adaptable and more accessible. MOOSE is a computer software that can be loaded onto most UNIX-compliant operating systems including, but not limited to, Mac OS X, Ubuntu, OpenSuSE, Fedora, CentOS and Redhat.
Oak Ridge National Laboratory has developed iSPM: Intelligent Software Suite for Personalized Modeling of Expert Opinions, Decisions and Errors in Visual Examination Tasks, a novel technology utilizing eye-tracking hardware, an intelligent GUI engine and advanced analytics to predict an individual’s perceptual behavior, cognitive response and risk of error for complex decision tasks such as cancer diagnosis from medical images.
Mapping of the human genome has advanced our understanding of life, health and potential cures for diseases. Many technologies could benefit from genome-level investigations. Now, a disruptive virtual scientific simulation tool that delivers a genome-level investigation for electrolytes is available. Idaho National Laboratory’s Kevin Gering has developed the Advanced Electrolyte Model (AEM), a molecular-based, scientifically proven simulation tool.
Researchers from North Carolina State Univ. have developed a novel and versatile modeling strategy to simulate polyelectrolyte systems. The model has applications for creating new materials as well as for studying polyelectrolytes, including DNA and RNA. Polyelectrolytes are chains of molecules that are positively or negatively charged when placed in water.
Computer security researchers have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Android Security Modules (ASM) framework aims to eliminate the bottleneck that prevents developers and users from taking advantage of new security tools.
With a method known as finite element analysis (FEA), engineers can generate 3-D digital models of large structures to simulate how they’ll fare under stress, vibrations, heat and other real-world conditions. Used for mapping out large-scale structures, these simulations require intensive computation done by powerful computers over many hours, costing engineering firms much time and money.
Oak Ridge National Laboratory’s DUCCS is ultra-efficient software that utilizes highly parallel chaotic map computations to quickly (in a few minutes) and efficiently detect component faults in computing units, memory elements and interconnects of hybrid CPU-GPU computing systems.
Port scanners are programs that search the Internet for systems that exhibit potential vulnerabilities. According to report published online, Hacienda is one such port scanning program. The report says that this program is being put into service by the "Five Eyes," a federation of Western secret services. Scientists have developed free software that can help prevent this kind of identification and thus the subsequent capture of systems.
Software developed by Univ. of California, Berkeley computer scientists seeks to tame the vast amount of visual data in the world by generating a single photo that can represent massive clusters of images. This tool can give users the photographic gist of a kid on Santa’s lap, housecats, or brides and grooms at their weddings. It works by generating an image that literally averages the key features of the other photos.
Rutgers Univ. researchers have shown that GPS technology is not needed to show where a driver traveled. A starting point and the driver's speed are enough when using a technique dubbed “elastic pathing”, which predicts pathways by seeing how speed patterns match street layouts. This could cause concerns for privacy, however, since many insurance companies offer discounts in return for customers allowing their driving habits to be monitored.
Russian hackers have stolen 1.2 billion user names and passwords in a series of Internet heists affecting 420,000 websites, according to a report published Tuesday. The thievery was described in a New York Times story based on the findings of Hold Security, a Milwaukee firm that has a history of uncovering online security breaches. For confidentiality reasons, the identities of the affected websites weren't identified by the Times.
Editors of photos routinely resize objects, or move them up, down or sideways, but Carnegie Mellon Univ. researchers are adding an extra dimension to photo editing by enabling editors to turn or flip objects any way they want, even exposing surfaces not visible in the original photograph.
An integrated, web-based platform for measuring research output and impact, monitoring trends and benchmarking, InCites is Thomson Reuters’ latest effort to allow users to easily assess and look beyond the global influence of a specific journal to conduct transparent analysis and make better decisions. The expanded assessment solution has been implemented on the 2014 edition of Journal Citation Reports.
By now, most scientists agree that the temperature of the planet is rising and that the increase is due to human activities. But the jury still out regarding the variability of that increase. Researchers using “big data” computational tools have recently taken a systematic approach to answering this question and their results point to both higher global temperatures and increasing variability among those temperature extremes.