The wind has long been used as a metaphor for constant change, wayward and capricious. Wind turbine engineers deal with that changeability every day, along with a host of other challenging factors. Their products must operate in desert sandstorms and in corrosive salt water. The ambient temperature at the turbine site can be blisteringly high or numbingly frigid.
In the early days, you typed in a domain name...
In the early days, you typed in a domain name...
Gathering all analytical data from different techniques for the same sample isn’t always an easy...
Imagine a user who intends to send $2 to a friend through PayPal. Embedded malware in the user’s laptop, however, converts the $2 transaction into a $2,000 transfer to the account of the malware author instead. Researchers at Georgia Institute of Technology have created a prototype software, Gyrus, that takes steps to prevent malware from sending spam emails and instant messages, and blocking unauthorized commands such as money transfers.
Researchers at the Korea Advanced Institute of Science and Technology have made a low-powered, high-speed, head-mounted display device they are calling K-Glass. This wearable electronic display has an augmented reality processor that enables users to do things like browse the menu, food and available tables of a restaurant simply by walking up to it and looking at its name.
Computer programming competitions known as "hackathons" have spread like viruses in recent years as ways for geeks, nerds and designers to get together to eat pizza, lose sleep and create something new. The marathon brainstorming sessions are focused on everything from developing apps to using computer code to solve the world's problems. This year a record 1,500 hackathons are planned around the globe, up from just a handful in 2010.
Buzzwords, like a virus, spread inexorably from discipline to discipline. Take “big data,” which originated in supercomputing and now has infected finance, logistics, intelligence and defense and life science. Is there some rule requiring every presentation on genomics to include a slide comparing sequencing costs to Moore’s Law, followed by slides lamenting how much data we are producing and the resources required to act on it?
A newly published research paper on super-resolution microscopy from the U.K. highlights best practices in a technique called localization microscopy, which uses fluorescent labelling and computer modelling to bypass the diffraction limit. The method described in the freely available paper summarizes the methods used to process captured images using MATLAB scripts.
Many companies have recognized an untapped opportunity for improving their development process: the requirements traceability matrix. Rather than wait until the end of the development cycle, the team builds the trace matrix when requirements first go under design control, and maintains it all the way through the submission process.
Via social media, researchers at the Federal Polytechnic Institute of Lausanne (EPFL) will be tracking emotions of the viewing public during the Olympic Games in Sochi. Their goal is to show, in real time, what people are feeling during the competitions. The new software will not only contend with multiple languages and breakneck speed, it will also track dozens of commonly used emoticons.
The biggest challenges many elite enterprises face are actually external forces completely out of their control, from geopolitical and economic macro trends to global threats to health and the environment. This lack of control creates a tumultuous global business climate that conspires to unravel even the most well-thought-out strategic plans.
Named “Project Lucy” after the earliest known human ancestor, IBM’s new 10-year, $100 million initiative will bring the Watson computer and other cognitive systems to Africa in a bid to fuel development and spur business opportunities across the world’s fastest growing continent. Watson, whose design team won an R&D Innovator of the Year Award in 2011, improves itself by learning and quickly accessing big data resources.
Oil and gas remain primary power sources for both personal and industrial use worldwide. Extraction of these fuel resources from underground reservoirs involves complex geomechanical processes, and can result in subsidence of the ground over a reservoir. Since this occurrence can have an impact on the environment and affect the operability of extraction equipment, it needs to be accurately predicted and kept within safe limits.
A team of engineers from the Univ. of California, Los Angeles has developed a smartphone attachment and application to test water for the presence of mercury, a toxic heavy metal. The new platform could significantly reduce the time and cost of the testing, and it could be particularly useful in regions with limited technological resources.
Water resource management efforts have given rise to several computer models dealing with hydrology, public policy, chemistry and more. Jonathan Goodall, associate professor of civil and environmental engineering at the Univ. of Virginia, is working to design an integrated computer modeling system that will seamlessly connect all the different models, enabling everyone involved in the water resources field to see the big picture.
France-based 3-D design software and product lifecycle management solutions (PLM) company Dassault Systèmes has announced the signing of a definitive merger agreement for Dassault Systèmes to acquire San Diego-based Accelrys, Inc., a leading provider of scientific innovation lifecycle management software for chemistry, biology and materials. The acquisition is valued at approximately $750 million.
As part of his PhD, postdoctoral research fellow Dr. Daniel Tune in Australia has designed a computer modelling system that shows which combination of carbon nanotubes absorb the most sunlight, therefore providing the most energy. In 2011, researchers in the U.S. successfully fabricated a solar cell using carbon nanotubes, but there are more than 70 different types of carbon nanotube that could be used in such solar cells.
Expectations are high for RoboEarth, a new European-funded system to speed the development of human-serving robots. Scientists from five major European technical universities have gathered in the Netherlands this week for its launch and to demonstrate possible applications. The first: the deceptively simple task of delivering a glass of milk to a patient in a mock-up hospital room.
Computer scientist Yi-Kai Liu at NIST has devised a way to make a security device that has proved notoriously difficult to build: a "one-shot" memory unit, whose contents can be read only a single time. The innovation, which uses qubits and conjugate coding, shows in theory how the laws of quantum physics could allow for the construction of such memory devices.
It is often better to be surrounded by copycats than innovators, according to a new Indiana Univ. study that created a virtual problem landscape to explore the advantages and disadvantages of “social learning”. The researchers thought at first it would be better to have innovators around, but in their experiments imitators offered the greater benefit.
According to a report from The New York Times, the National Security Agency has implanted software in nearly 100,000 computers around the world that allows the U.S. to conduct surveillance on those machines. The technology, which is not used in the U.S., relies on radio waves that can be transmitted from tiny circuit boards and USB cards inserted covertly into the computers.
When our Internet-connected gadgets and home appliances all learn to talk to each other, Google wants to be at the center of the conversation. This imagined future is still a few years away, but the search giant is already preparing with its $3.2 billion acquisition of high-tech thermostat and smoke-detector maker Nest Labs.
A patent mapping system that considers how patents cite one another may help researchers better understand the relationships between technologies and how they may come together to spur disruptive new areas of innovation. The system, which also categorizes patents in a new way, was produced by a team of researchers from three universities and an Atlanta-based producer of data-mining software.
Researchers at the Massachusetts Institute of Technology have found a way to allow people in one place to interact with 3-D versions of people or objects in a different location. MIT's Tangible Media Group calls the technology inFORM, and it could one day be used by architects, urban planners, or even doctors who need to look at computed tomography scans.
A German magazine lifted the lid on the operations of the National Security Agency's hacking unit Sunday, reporting that American spies intercept computer deliveries, exploit hardware vulnerabilities, and even hijack Microsoft's internal reporting system to spy on their targets.
The real world has not caught up yet with "Star Wars" and its talking, thinking robots, but some of the most sophisticated units that exist are heading to Florida this week for a Defense Department-sponsored competition. Seventeen humanoid robots will be evaluated Friday and Saturday for how well they can complete tasks including driving an all-terrain vehicle and opening doors.
Researchers at the Wyss Institute for Biologically Inspired Engineering and Harvard Univ. have have recently shown that an important class of artificial intelligence algorithms could be implemented using chemical reactions. These algorithms use a technique called “message passing inference on factor graphs” and are a mathematical coupling of ideas from graph theory and probability.
Hipster, surfer or biker? Computers may soon be able to tell the difference: Scientists in California are developing an algorithm that uses group pictures to determine to which of these groups, or urban tribes, you belong. So far, the algorithm is 48% accurate on average, much better than chance but not yet to level of humans.
- Page 1