Damage to or theft of technical equipment represents a dramatic financial and scientific loss to researchers. Scientists in Germany decided to find out whether the information content and tone of labels attached to the equipment could reduce the incidence of vandalism. They found that a friendly, personal label reduced the interaction of people with the equipment in comparison with neutral or threatening labels.
Google has become less likely to comply with...
The widespread use of advanced surveillance...
Poor research data can lead to mistakes in equipment selection, over-design of...
Officials demanded Monday that an advertising firm stop using a network of high-tech trash cans to track people walking through London's financial district. The Renew ad firm has been using technology embedded in the hulking receptacles to measure the Wi-Fi signals emitted by smartphones, and suggested that it would apply the concept of "cookies"—tracking files that follow Internet users across the Web—to the physical world.
Some 60 years ago, a doctor in Baltimore removed cancer cells from a poor black patient named Henrietta Lacks without her knowledge or consent. Those cells eventually helped lead to a multitude of medical treatments and lay the groundwork for the multibillion-dollar biotech industry. Now, for the first time, the Lacks family has been given a say over at least some research involving her cells.
American information is so valuable, experts say, that no amount of global outrage over secret U.S. surveillance powers would cause Britain, Canada, Australia and New Zealand to ditch their collaborative spying arrangement: the Five Eyes. Revelations from NSA leaker Edward Snowden, they say, are unlikely to stop or even slow the global growth of secret-hunting—an increasingly critical factor in the security and prosperity of nations.
It's not hard to see that men are more likely to engage in risky behaviors than women, or that crime rates are many times higher among men, but this tendency to break the rules also extends to male scientists, according to a recent study. The study did not examine why men are more likely to commit fraud, but the study’s author suggested one possibility is that misconduct is biologically driven
A recent review of retractions in medical and biological peer-reviewed journals finds the percentage of studies withdrawn because of fraud or suspected fraud has jumped substantially since the mid-1970s. In 1976, there were fewer than 10 fraud retractions for every 1 million studies published, compared with 96 retractions per million in 2007.
From Napster to iTunes to Pandora, the methods by which the public can obtain and share music have rapidly progressed. Future groundbreaking innovations may need to wait, though, as the next generation of technology is being stymied by the very copyright laws that seek to protect the industry, says Rutgers-Camden University professor Michael Carrier in a new article for a law journal..
With billions of dollars and control of the U.S. smartphone and computer tablets markets at stake, jury selection began Monday in a closely watched trial between two of the world's leading tech companies over patents. Cupertino-based Apple is demanding $2.5 billion in damages from Samsung Electronics Co., an award that would dwarf the largest patent-related verdict to date.
Do you have what it takes to be an ethical hacker? Can you step into the shoes of a professional paid to outsmart supposedly locked-down systems? "Control-Alt-Hack", a new card game developed by University of Washington computer scientists, gives teenage and young-adult players a taste of what it means to be a computer-security professional defending against an ever-expanding range of digital threats.
Professors from Purdue University and the University of North Carolina at Charlotte are bringing editors of academic journals together to reaffirm their commitment to research integrity.
It’s a situation we’ve all probably encountered: a coffee shop full of laptop users and no place to sit. According to recent studies at Boston College, “plugged-in” customers are increasingly grabbing extra seats counter space and table tops by using cell phones, laptops, and cups of steaming hot coffee to shield others from seemingly public spaces
Four months ago the U.S. government sought to block publication of two studies about how scientists created an easily spread form of bird flu. Now a revised version of one paper is seeing the light of day with the government's blessing. The second paper, which is more controversial because it involves what appears to be a more dangerous virus, is expected to be published later.
Engineers are developing new and innovative ways of coating medical materials with nano-sized particles of silver, an element that has long been known for its antimicrobial properties. However, a recent paper from the University of Notre Dame highlights the fact that a vast majority of bacteria are actually neutral, or even beneficial. Overuse of nanosilver might harm their useful functions in daily life, the paper reports.
Shortly after Tuesday's release of the long-awaited Google Drive service, technology blogs and Twitter users were picking apart a legal clause that made it sound as if all the users' content stored in Google Drive automatically would become the intellectual property of Google Inc. As it turns out, the worries are probably unfounded.
With about a third of the world's rare earth reserves and supplying 90% of what is consumed, China has come under fire for imposing limits on rare earths production and exports. In response, the country has begun an industry association designed fend off these complaints and administer greater regulation of the sector.
Today, scientists map entire genomes mostly for research, but as genome mapping gets faster and cheaper, scientists and consumers have wondered about possible broader use: Would finding all the glitches hidden in your DNA predict which diseases you'll face decades later? Unfortunately, it’s not that simple, say experts.
On Friday, the U.S. government's biosecurity advisers said they support publishing research studies showing how scientists made new easy-to-spread forms of bird flu because the studies, now revised, don't reveal details bioterrorists could use. The announcement could end debate sparked by the government’s request last December that scientists refrain from publishing all the details of their work.
China holds about a third of the world's rare earth reserves but supplies about 90% of what is consumed. In the past two years it has imposed limits on its exports, citing a need to impose order on an unruly domestic market and to reduce environmental damage. Officials from the U.S. the European Union, and Japan met recently to propose ways to ensure secure supplies of strategically vital rare earths and other critical materials.
The Supreme Court this week threw out a lower court ruling allowing human genes to be patented. The court overturned patents belonging to Myriad Genetics Inc. of Salt Lake City on two genes linked to increased risk of breast and ovarian cancer.
Financially troubled Proview Electronics Co., a computer monitor and LED light maker, says it registered the iPad trademark in China and elsewhere more than a decade ago and wants Apple to stop selling or making the popular tablet computers under that name. Whatever the outcome, the dispute highlights the rising stakes of the trademark name game in the increasingly lucrative China consumer market, one that most global companies cannot afford to miss out on regardless of the risks.
After two laboratories reported created new, easier-to-spread version of the deadly bird flu viruses, research was temporarily halted on Jan. 20. The pause comes as fierce debate intensifies over how to handle this high-risk research.
Internet users quickly learned about the standoff between technology companies and Hollywood on Wednesday. Google blacked out its name, Reddit shut down for 12 hours, and Wikipedia blacked out its main site for the full day. At issue are two congressional proposals intended to limit online piracy of movies and TV programs.
Britain's electronic listening agency, GCHQ, quietly launched a cryptic Website last month featuring a box of code made up of numbers and letters. There is no branding on the site, only the phrase "Can you crack it?" and a box to type in an answer.
For years, experts and officials have complained about cyberattacks emanating from China. Now, U.S. intelligence agencies have published a report that offers the first detailed public accusations from U.S. officials, saying computer attacks by foreign governments and corporate hackers are on the rise and represent a "persistent threat to U.S. economic security."
According to Internet security software vendor Symantec, cyber attacks traced to China recently targeted at least 48 chemical and military-related companies in an effort to steal technical secrets. The victims included multiple Fortune 100 companies.
Among the many revelations from Walter Isaacson’s biography of Apple’s co-founder is the anger Jobs had toward Google, which he claimed stole technology and features from Apple for its Android software. His comments suggest Google, which has been acquiring patents to shore up its legal claims, may face vigorous court battles with Apple.
- Page 1