Bluesky Facebook Reddit Email

Life Sciences

Comprehensive exploration of living organisms, biological systems, and life processes across all scales from molecules to ecosystems. Encompasses cutting-edge research in biology, genetics, molecular biology, ecology, biochemistry, microbiology, botany, zoology, evolutionary biology, genomics, and biotechnology. Investigates cellular mechanisms, organism development, genetic inheritance, biodiversity conservation, metabolic processes, protein synthesis, DNA sequencing, CRISPR gene editing, stem cell research, and the fundamental principles governing all forms of life on Earth.

447,757 articles | 2542 topics

Health and Medicine

Comprehensive medical research, clinical studies, and healthcare sciences focused on disease prevention, diagnosis, and treatment. Encompasses clinical medicine, public health, pharmacology, epidemiology, medical specialties, disease mechanisms, therapeutic interventions, healthcare innovation, precision medicine, telemedicine, medical devices, drug development, clinical trials, patient care, mental health, nutrition science, health policy, and the application of medical science to improve human health, wellbeing, and quality of life across diverse populations.

431,843 articles | 751 topics

Social Sciences

Comprehensive investigation of human society, behavior, relationships, and social structures through systematic research and analysis. Encompasses psychology, sociology, anthropology, economics, political science, linguistics, education, demography, communications, and social research methodologies. Examines human cognition, social interactions, cultural phenomena, economic systems, political institutions, language and communication, educational processes, population dynamics, and the complex social, cultural, economic, and political forces shaping human societies, communities, and civilizations throughout history and across the contemporary world.

260,756 articles | 745 topics

Physical Sciences

Fundamental study of the non-living natural world, matter, energy, and physical phenomena governing the universe. Encompasses physics, chemistry, earth sciences, atmospheric sciences, oceanography, materials science, and the investigation of physical laws, chemical reactions, geological processes, climate systems, and planetary dynamics. Explores everything from subatomic particles and quantum mechanics to planetary systems and cosmic phenomena, including energy transformations, molecular interactions, elemental properties, weather patterns, tectonic activity, and the fundamental forces and principles underlying the physical nature of reality.

257,913 articles | 1552 topics

Applied Sciences and Engineering

Practical application of scientific knowledge and engineering principles to solve real-world problems and develop innovative technologies. Encompasses all engineering disciplines, technology development, computer science, artificial intelligence, environmental sciences, agriculture, materials applications, energy systems, and industrial innovation. Bridges theoretical research with tangible solutions for infrastructure, manufacturing, computing, communications, transportation, construction, sustainable development, and emerging technologies that advance human capabilities, improve quality of life, and address societal challenges through scientific innovation and technological progress.

225,386 articles | 998 topics

Scientific Community

Study of the practice, culture, infrastructure, and social dimensions of science itself. Addresses how science is conducted, organized, communicated, and integrated into society. Encompasses research funding mechanisms, scientific publishing systems, peer review processes, academic ethics, science policy, research institutions, scientific collaboration networks, science education, career development, research programs, scientific methods, science communication, and the sociology of scientific discovery. Examines the human, institutional, and cultural aspects of scientific enterprise, knowledge production, and the translation of research into societal benefit.

193,043 articles | 157 topics

Space Sciences

Comprehensive study of the universe beyond Earth, encompassing celestial objects, cosmic phenomena, and space exploration. Includes astronomy, astrophysics, planetary science, cosmology, space physics, astrobiology, and space technology. Investigates stars, galaxies, planets, moons, asteroids, comets, black holes, nebulae, exoplanets, dark matter, dark energy, cosmic microwave background, stellar evolution, planetary formation, space weather, solar system dynamics, the search for extraterrestrial life, and humanity's efforts to explore, understand, and unlock the mysteries of the cosmos through observation, theory, and space missions.

29,662 articles | 175 topics

Research Methods

Comprehensive examination of tools, techniques, methodologies, and approaches used across scientific disciplines to conduct research, collect data, and analyze results. Encompasses experimental procedures, analytical methods, measurement techniques, instrumentation, imaging technologies, spectroscopic methods, laboratory protocols, observational studies, statistical analysis, computational methods, data visualization, quality control, and methodological innovations. Addresses the practical techniques and theoretical frameworks enabling scientists to investigate phenomena, test hypotheses, gather evidence, ensure reproducibility, and generate reliable knowledge through systematic, rigorous investigation across all areas of scientific inquiry.

21,889 articles | 139 topics

Mathematics

Study of abstract structures, patterns, quantities, relationships, and logical reasoning through pure and applied mathematical disciplines. Encompasses algebra, calculus, geometry, topology, number theory, analysis, discrete mathematics, mathematical logic, set theory, probability, statistics, and computational mathematics. Investigates mathematical structures, theorems, proofs, algorithms, functions, equations, and the rigorous logical frameworks underlying quantitative reasoning. Provides the foundational language and tools for all scientific fields, enabling precise description of natural phenomena, modeling of complex systems, and the development of technologies across physics, engineering, computer science, economics, and all quantitative sciences.

3,023 articles | 113 topics

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Blockchain technology could help build trust in restaurants

Researchers at the University of Missouri found that using blockchain to track ingredients through the supply chain reduces consumer uncertainty about food safety and increases willingness to pay premium prices. The technology also provides clear information about the source of ingredients, boosting trust in sustainable foods.

A new attack reshapes the rules of Bitcoin mining

A new attack, Infiltrated Selfish Mining (ISM), could reshape the rules of Bitcoin mining by allowing attackers to profit simultaneously. ISM avoids the miner's dilemma and yields up to 1.52 times more rewards than previous attacks.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Decoding quantum advantage

Researchers at Kyoto University have characterized quantum advantage by proving an equivalence between its existence and the security of certain cryptographic primitives. This breakthrough implies that when quantum advantage does not exist, many conventional cryptographic primitives are broken, including post-quantum ones.

AmScope B120C-5M Compound Microscope

AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.

Who really calls the shots in crypto decision-making?

A study by Complexity Science Hub found that in 7.54% of DAOs, a single contributor controlled decisions due to concentrated governance tokens. This raises concerns about the true level of democracy in these organizations, which aim to distribute power and promote fairness and transparency.

Researchers achieve quantum computing milestone, realizing certified randomness

A team of researchers from JPMorganChase, Quantinuum, and the University of Texas at Austin have successfully demonstrated certified randomness using a 56-qubit quantum computer. This achievement has significant implications for cryptography, fairness, and privacy, as it enables the generation of truly random numbers that cannot be man...

Kornaropoulos to receive NSF CAREER Award

Evgenios Kornaropoulos at George Mason University will receive a $648,811 NSF CAREER Award to investigate encrypted systems with fine-grained leakage. He aims to develop cryptographic designs with customized efficiency-security trade-offs in various settings.

Apple AirPods Pro (2nd Generation, USB-C)

Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.

New technology could quash QR code phishing attacks

Researchers have developed a new form of QR code that can protect users from phishing attacks by signaling whether a link is safe or not. The SDMQR codes provide an added layer of security without interfering with existing functionality, allowing companies to replace traditional barcodes with more sophisticated QR codes.

Researchers demonstrate new technique for stealing AI models

A team of researchers has developed a novel technique to steal artificial intelligence (AI) models by monitoring electromagnetic signals. The method allows attackers to recreate the high-level features of an AI model with 99.91% accuracy, potentially undermining intellectual property rights and exposing sensitive data.

The 11th Heidelberg Laureate Forum begins September 22

The 11th Heidelberg Laureate Forum brings together 200 young mathematicians and computer scientists to engage with renowned experts on pressing issues like climate change and artificial intelligence. The forum features lectures, panel discussions, and interactive coverage to inspire the next generation of researchers.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

Rice research shows promise for advancing quantum networks

Rice University engineers have demonstrated a way to control the optical properties of T centers, paving the way toward leveraging these point defects for building quantum nodes. By embedding a T center in a photonic integrated circuit, they increased the collection efficiency for single photon emission by two orders of magnitude.

Better cybersecurity with new material

Researchers at Linköping University develop a new type of quantum random number generator based on perovskite light emitting diodes, providing improved randomness and security. The technology has the potential to be cheaper and more environmentally friendly than traditional methods.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

DBST: a lightweight block cipher based on dynamic S-box

The DBST algorithm proposes a novel generalized Feistel variant structure and key-dependent dynamic S-box model to improve diffusion effects. It has demonstrated high security, high throughput rate, and low hardware resources in experiments.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

Codebreakers crack secrets of Mary Queen of Scots’ lost letters

A team of international codebreakers has deciphered 57 previously unknown letters written by Mary Queen of Scots while imprisoned in England. The letters provide insights into her captivity and communication with French ambassador Michel de Castelnau, including complaints about poor health and negotiations for release.

Rensselaer researchers work to avoid future FTX debacles

Researchers at Rensselaer Polytechnic Institute developed a model to predict cryptocurrency scams using Benford's Law and found that scam addresses deviated from the law. They also advocated for robust blockchain interoperability to provide stability in decentralized systems.

A faster way to preserve privacy online

Researchers at MIT have developed a scheme for private information retrieval that is about 30 times faster than other comparable methods. The technique enables users to search an online database without revealing their query to the server, with potential applications in private communication and targeted advertising.

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.

UTD engineers join initiative to tackle hardware trojans

Researchers aim to improve detection and removal of hardware trojans, which can disrupt wireless communication and leak sensitive information. The project is part of a public-private partnership aiming to accelerate the translation of research findings into new technologies.

Unreliable neurons improve brain functionalities

Neuronal silencing periods enable efficient temporal sequence identification, allowing the brain to remember phone numbers and PINs. A new AI mechanism utilizing this mechanism also protects against stolen cards by recognizing personal handwriting style and timing.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.

Thinking like a cyber-attacker to protect user data

MIT researchers found a vulnerable component in computer processors that can be exploited by malicious agents. They developed two mitigation strategies, including scheduling sensitive software on less vulnerable cores and reserving susceptible cores for trusted applications.

How randomly moving electrons can improve cyber security

A team of researchers at Indian Institute of Science developed a record-breaking true random number generator (TRNG) that uses the random motion of electrons to generate secure random numbers. The device, which is more compact and faster than previous TRNGs, has exceeded NIST standards with a high min-entropy value of 0.98.

CalDigit TS4 Thunderbolt 4 Dock

CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.

Secure communication with light particles

Researchers at TU Darmstadt have developed a scalable quantum network that enables secure key exchange and protection of sensitive information. The system uses entanglement-based time-bin coding to distribute photons to users, ensuring robust security against eavesdropping attacks.

Ultrafast all-optical random bit generator

Researchers proposed and experimentally demonstrated an all-optical random bit generation method using chaotic pulses quantized in the optical domain. This method generated a 10 Gb/s random bit stream, potentially operable at higher rates by exploiting ultrafast fiber response.

Researchers show they can steal data during homomorphic encryption

Researchers at North Carolina State University identified a vulnerability in homomorphic encryption that allows data to be stolen during the encryption process. This discovery highlights the need for protection against side-channel attacks, which can compromise even next-generation encryption technologies.

A security technique to fool would-be cyber attackers

Researchers developed DAGguise, a scheme that shapes memory requests into a predefined pattern to prevent contention attacks and enable faster computation. The technique represents programs' memory access requests as a graph, where each request is stored in a node, and the edges are time dependencies between requests.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.

The power of chaos: a robust and low-cost cryptosystem for the post-quantum era

A team of researchers from Ritsumeikan University developed an unprecedented stream cipher using chaos theory to create highly secure cryptographic systems. The new system is resistant to statistical attacks and eavesdropping, even against quantum computers, making it a promising solution for post-quantum era cryptosystems.

Algorithms improve how we protect our data

Researchers at DGIST developed new algorithms to estimate min-entropy, a key metric for cryptography, using less data and improving speed. The new approach can be used in memory-constrained devices like Internet-of-things devices.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

Achieving privacy and integrity in the cloud

The PICOCRYPT project guarantees the integrity, privacy and effectiveness of computation on data stored in the cloud. Cryptographic techniques will be used to solve problems related to espionage and incorrect results.

More privacy when using WhatsApp, Signal and Co.

Researchers at Graz University of Technology develop a new method of contact discovery that significantly limits privacy threats, using intersection calculations and encryption protocols. The ContactGuard application stores encrypted address book entries on the mobile phone, preventing service providers from accessing sensitive data.

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

PLATYPUS: New vulnerabilities discovered in Intel processors

Researchers at Graz University of Technology discovered a method to exploit Intel processors using power side-channel attacks, even without physical access. The technique uses the RAPL interface and misuses Intel's SGX functionality to extract sensitive data.

New tool detects unsafe security practices in Android apps

A new open-source tool, CRYLOGGER, analyzes thousands of Android apps to detect cryptographic misuses without requiring access to the app's code. The study found that nearly all popular Android apps contain code or use libraries that do not strictly adhere to security standards.

Anti-hacking based on the circular polarization direction of light

Researchers from KIST and PNU developed an encryption device that detects circularly polarized light to strengthen IoT security. The device uses a phototransistor with cholesteric liquid crystal and π-conjugated polymer, exhibiting high sensitivity in detecting circular polarization.

Popular messenger services are extremely insecure

Researchers discovered that popular messengers like WhatsApp, Signal, and Telegram allow for large-scale abuse of contact discovery services, exposing sensitive user data. Attackers can build accurate behavior models by querying random phone numbers, enabling them to track users across social networks and public data sources.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

Smart responsive lasing signals for high-security optical encryption

Researchers propose a strategy to achieve multiple responsive lasing emission states for high-security optical encryption by modulating the competition between radiative rate of donor and the rate of energy transfer in FRET microlasers. This approach enables dynamic lasing action control, resulting in distinguishable lasing states.

Randomness theory could hold key to internet security

Researchers at Cornell University have identified a problem that holds the key to whether all encryption can be broken. The study connects two areas of mathematics - cryptography and algorithmic information theory - to show that a natural computational problem characterizes the feasibility of basic cryptography.

Leading authority on cryptography and data privacy receives Knuth Prize

Cynthia Dwork has received the Knuth Prize for her groundbreaking work on cryptography in network environments, privacy, and foundational contributions to theoretical computer science. Her research transformed several fields, including distributed systems, data privacy, and fairness in algorithmic decision making.

Cryptographic 'tag of everything' could protect the supply chain

A cryptographic 'tag of everything' can verify a product's authenticity, with implications for combating losses due to supply chain counterfeiting. The MIT-developed ID chip is small enough for virtually any product, uses photovoltaic diodes for power and backscatter technique for transmission.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

Automated cryptocode generator is helping secure the web

A Massachusetts Institute of Technology-developed system automatically generates optimized cryptography code for Google Chrome browsers and web applications, matching performance of handwritten code but faster. The system, known as Fiat Cryptography, is being widely used by tech firms and has populated Google's BoringSSL library.

Cryptographic breakthrough helps spies to shake hands

Researchers at Stevens Institute of Technology have developed a new encryption system called matchmaking encryption, which allows for secure and private communication. The system uses real-time interactions to verify participants' identities, enabling messages to be sent on a 'dead drop' basis and read at a later date.

New app can secure all your saved emails

The new Easy Email Encryption (E3) app automatically encrypts incoming emails on trusted devices, providing real-world security without requiring technical expertise. With receiver-controlled encryption and per-device key pairs, E3 makes email protection accessible to non-technical users.

Communication interception can be traced through meteor trails

Physicists at Kazan Federal University developed a refined simulation of joint reception areas for meteor radio reflections. The study reveals that unpredictable nature of meteors makes signal interception challenging, with practical possibilities disappearing at 30 km distances.

Accelerating drug discovery by crowdsourcing confidential data

Researchers developed a secure multiparty computation protocol to facilitate collaboration among pharmaceutical companies and laboratories without revealing confidential data. The approach improved the ability of predictive models to identify new therapeutic candidates at an unprecedented scale and rate.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.