Benefit Vs. Risk of Facial Recognition Technology
Law enforcement agencies are using facial recognition software as a crime-fighting tool. Now businesses are looking to use the technology to reach customers. But a professor questions whether customers...
View ArticleData Storage: Synchronized at the ‘Write Time’
Numerical simulations show how to avoid imperfections in the next generation of high-density data storage. A scanning electron microscope image of a bit-patterned recording medium, with ordered arrays...
View ArticleScientists Use Crowd-Sourcing to Help Map Global Carbon Dioxide Emissions
Climate science researchers from Arizona State University are launching a first-of-its-kind online “game” to better understand the sources of global warming gases. By engaging “citizen scientists,” the...
View ArticleBionimbus Protected Data Cloud to Enable Researchers to Analyze Cancer Data
The University of Chicago has launched the first secure cloud-based computing system that enables researchers to access and analyze human genomic cancer information without the costly and cumbersome...
View ArticleBig Data, for Better or Worse: 90% of World’s Data Generated Over Last Two Years
A full 90% of all the data in the world has been generated over the last two years. The internet companies are awash with data that can be grouped and utilised. Is this a good thing? Big Data makes it...
View ArticleCradle Turns Smartphone Into Handheld Biosensor
Researchers and physicians in the field could soon run on-the-spot tests for environmental toxins, medical diagnostics, food safety and more with their smartphones. Smartphone Biosensor. University of...
View ArticleBuilding 3-D Fractals On a Nano Scale
It starts with one 3D structure with eight planes, an octahedron. This repeats itself to smaller octahedra: 625 after just four steps. At every corner of a new octahedron, a successive octahedron is...
View ArticleWi-Fi Signals Enable Gesture Recognition Throughout Entire Home
Forget to turn off the lights before leaving the apartment? No problem. Just raise your hand, finger-swipe the air, and your lights will power down. Want to change the song playing on your music system...
View ArticleIs there a new kid in town?
In today’s international learning landscape the role of e-Learning/on-line learning is providing more and more opportunities for International Schools to leverage a greater capacity to provide a...
View ArticleWhen Will My Computer Understand Me?
It’s not hard to tell the difference between the “charge” of a battery and criminal “charges.” But for computers, distinguishing between the various meanings of a word is difficult. A "charge" can be a...
View ArticleApp to Protect Private Data On iOS Devices Finds Almost Half of Other Apps...
Almost half of the mobile apps running on Apple’s iOS operating system access the unique identifier of the devices where they’re downloaded, computer scientists at the University of California, San...
View ArticleBreakthrough in Internet Bandwidth: New Fiber Optic Technology Could Ease...
As rapidly increasing demand for bandwidth strains the Internet’s capacity, a team of engineers has devised a new fiber optic technology that promises to increase bandwidth dramatically. The new...
View ArticleNew Hardware Design Protects Data in the Cloud
Cloud computing — outsourcing computational tasks over the Internet — could give home-computer users unprecedented processing power and let small companies launch sophisticated Web services without...
View ArticleTaking the ‘Random’ out of a Random Laser
Random Lasers are tiny structures emitting light irregularly into different directions. Scientists at the Vienna University of Technology have now shown that these exotic light sources can be...
View ArticleEye-Tracking Could Outshine Passwords If Made User-Friendly
It’s a wonder we still put up with passwords. The prototype was built to simulate an ATM screen. In this scenario, users followed the highlighted dots with their eyes and the technology tracked their...
View ArticleGhost Particles: New Limits On Extremely Rare Decay
Neutrinos are the most elusive particles having extremely weak interactions with all other particles. They have rather unusual properties and are even expected to be identical with their own...
View ArticleResearchers Develop System That Uses a Big Data Approach to Personalized...
University of Notre Dame researchers have developed a computer-aided method that uses electronic medical records to offer the promise of rapid advances toward personalized health care, disease...
View ArticleQuadcopter Piloted by a Smartphone
The quadcopter, which was developed at TU Vienna, can negotiate its way through a room completely on its own. It does not need any human interference, and in contrast to other models, it is not...
View ArticleNeutron Stars in the Computer Cloud
Einstein@Home discovers 24 new pulsars in archival data. The combined computing power of 200,000 private PCs helps astronomers take an inventory of the Milky Way. The Einstein@Home project connects...
View ArticleThere is a needle in the haystack, Ground Control.
All of us are engaged daily in the process of looking for information on the Internet, or “searching”. Sometimes, we search for clarification, facts, confirmation, projects, solutions, while other...
View Article