Bluesky Facebook Reddit Email

Life Sciences

Comprehensive exploration of living organisms, biological systems, and life processes across all scales from molecules to ecosystems. Encompasses cutting-edge research in biology, genetics, molecular biology, ecology, biochemistry, microbiology, botany, zoology, evolutionary biology, genomics, and biotechnology. Investigates cellular mechanisms, organism development, genetic inheritance, biodiversity conservation, metabolic processes, protein synthesis, DNA sequencing, CRISPR gene editing, stem cell research, and the fundamental principles governing all forms of life on Earth.

447,757 articles | 2542 topics

Health and Medicine

Comprehensive medical research, clinical studies, and healthcare sciences focused on disease prevention, diagnosis, and treatment. Encompasses clinical medicine, public health, pharmacology, epidemiology, medical specialties, disease mechanisms, therapeutic interventions, healthcare innovation, precision medicine, telemedicine, medical devices, drug development, clinical trials, patient care, mental health, nutrition science, health policy, and the application of medical science to improve human health, wellbeing, and quality of life across diverse populations.

431,843 articles | 751 topics

Social Sciences

Comprehensive investigation of human society, behavior, relationships, and social structures through systematic research and analysis. Encompasses psychology, sociology, anthropology, economics, political science, linguistics, education, demography, communications, and social research methodologies. Examines human cognition, social interactions, cultural phenomena, economic systems, political institutions, language and communication, educational processes, population dynamics, and the complex social, cultural, economic, and political forces shaping human societies, communities, and civilizations throughout history and across the contemporary world.

260,756 articles | 745 topics

Physical Sciences

Fundamental study of the non-living natural world, matter, energy, and physical phenomena governing the universe. Encompasses physics, chemistry, earth sciences, atmospheric sciences, oceanography, materials science, and the investigation of physical laws, chemical reactions, geological processes, climate systems, and planetary dynamics. Explores everything from subatomic particles and quantum mechanics to planetary systems and cosmic phenomena, including energy transformations, molecular interactions, elemental properties, weather patterns, tectonic activity, and the fundamental forces and principles underlying the physical nature of reality.

257,913 articles | 1552 topics

Applied Sciences and Engineering

Practical application of scientific knowledge and engineering principles to solve real-world problems and develop innovative technologies. Encompasses all engineering disciplines, technology development, computer science, artificial intelligence, environmental sciences, agriculture, materials applications, energy systems, and industrial innovation. Bridges theoretical research with tangible solutions for infrastructure, manufacturing, computing, communications, transportation, construction, sustainable development, and emerging technologies that advance human capabilities, improve quality of life, and address societal challenges through scientific innovation and technological progress.

225,386 articles | 998 topics

Scientific Community

Study of the practice, culture, infrastructure, and social dimensions of science itself. Addresses how science is conducted, organized, communicated, and integrated into society. Encompasses research funding mechanisms, scientific publishing systems, peer review processes, academic ethics, science policy, research institutions, scientific collaboration networks, science education, career development, research programs, scientific methods, science communication, and the sociology of scientific discovery. Examines the human, institutional, and cultural aspects of scientific enterprise, knowledge production, and the translation of research into societal benefit.

193,043 articles | 157 topics

Space Sciences

Comprehensive study of the universe beyond Earth, encompassing celestial objects, cosmic phenomena, and space exploration. Includes astronomy, astrophysics, planetary science, cosmology, space physics, astrobiology, and space technology. Investigates stars, galaxies, planets, moons, asteroids, comets, black holes, nebulae, exoplanets, dark matter, dark energy, cosmic microwave background, stellar evolution, planetary formation, space weather, solar system dynamics, the search for extraterrestrial life, and humanity's efforts to explore, understand, and unlock the mysteries of the cosmos through observation, theory, and space missions.

29,662 articles | 175 topics

Research Methods

Comprehensive examination of tools, techniques, methodologies, and approaches used across scientific disciplines to conduct research, collect data, and analyze results. Encompasses experimental procedures, analytical methods, measurement techniques, instrumentation, imaging technologies, spectroscopic methods, laboratory protocols, observational studies, statistical analysis, computational methods, data visualization, quality control, and methodological innovations. Addresses the practical techniques and theoretical frameworks enabling scientists to investigate phenomena, test hypotheses, gather evidence, ensure reproducibility, and generate reliable knowledge through systematic, rigorous investigation across all areas of scientific inquiry.

21,889 articles | 139 topics

Mathematics

Study of abstract structures, patterns, quantities, relationships, and logical reasoning through pure and applied mathematical disciplines. Encompasses algebra, calculus, geometry, topology, number theory, analysis, discrete mathematics, mathematical logic, set theory, probability, statistics, and computational mathematics. Investigates mathematical structures, theorems, proofs, algorithms, functions, equations, and the rigorous logical frameworks underlying quantitative reasoning. Provides the foundational language and tools for all scientific fields, enabling precise description of natural phenomena, modeling of complex systems, and the development of technologies across physics, engineering, computer science, economics, and all quantitative sciences.

3,023 articles | 113 topics

Cryptographic protocol enables greater collaboration in drug discovery

MIT researchers developed a cryptographic system to securely analyze massive pharmacological datasets, enabling broad pooling of sensitive data for predictive drug discovery. The neural network identified novel interactions, including one with leukemia drug imatinib and an enzyme ErbB4, which could have clinical significance.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Trailblazer in computational complexity theory to receive Knuth Priize

Johan Torkel Håstad of KTH Royal Institute of Technology is awarded the 2018 Donald E. Knuth Prize for his significant contributions to computer science, including optimization and cryptography. The prize recognizes his transformative techniques that have influenced subsequent work in these areas.

Email encryption standards hacked

Researchers demonstrated that two common email encryption standards are vulnerable to attacks, compromising secure communication. The S/MIME standard is not suitable for secure communication due to outdated cryptography, while OpenPGP can be configured securely but often isn't.

Towards sustainable blockchains

Researchers at IST Austria propose using disk space instead of computational power to secure blockchains, reducing energy consumption and promoting sustainability. The 'proofs of sequential work' approach has the potential to revolutionize blockchain design, offering a more eco-friendly alternative to traditional proof-of-work systems.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

For nuclear weapons reduction, a way to verify without revealing

Researchers at MIT have developed a physics-based system to verify the destruction of nuclear warheads, using cryptographic keys in physical form. The new method uses neutron detection and resonance processes to identify authentic warheads, while concealing their designs.

Attacks on 4G LTE networks could send fake emergency alerts

Researchers from Purdue University have identified several new vulnerabilities in 4G LTE networks that could be exploited by hackers to forge the location of a mobile device and fabricate messages. The attacks, including authentication relay and denial of service attacks, were validated through experimentation on a real testbed.

Energy-efficient encryption for the internet of things

MIT researchers have developed a new chip that consumes only 1/400 as much power as software execution of public-key encryption protocols, executing 500 times faster. The chip uses a general-purpose elliptic-curve design and features a dedicated inverter circuit to increase energy efficiency and reduce surface area.

The ultimate defense against hackers may be just a few atoms thick

Researchers at NYU Tandon School of Engineering have introduced a new class of unclonable cybersecurity primitives made from low-cost nanomaterials with high structural randomness. These primitives can be used to securely encrypt and authenticate computer hardware and data physically, rather than through programming.

'The dark side' of quantum computers

Quantum computers threaten to destroy current internet security methods as they can break RSA and ECC systems in days or hours. Researchers like Tanja Lange are working on alternative systems, including a $3.9 million EU-funded research consortium.

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.

System piggybacks on Bitcoin to prevent identity theft

Researchers from MIT's Computer Science and Artificial Intelligence Laboratory have developed a new system called Catena that uses Bitcoin's security machinery to defend against online identity theft and equivocation. The system requires the download of only about 40 megabytes of data, making it suitable for smartphones.

New research horizons

Two UCSB faculty members, Stefano Tessaro and Andrea Young, have been selected as recipients of the prestigious Alfred P. Sloan Research Fellowship for their outstanding contributions to cryptography and condensed matter physics. The fellowships will support their research efforts in building solid theoretical foundations for cryptogra...

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

Researchers devise secure, efficient anonymity network

A new anonymity scheme called Riffle provides strong security guarantees while using bandwidth efficiently. The system employs a mixnet with onion encryption and uses authentication encryption to verify the authenticity of messages, ensuring cryptographically secure communication as long as one server remains uncompromised.

Cryptographic system lets users control access to their data

Researchers at MIT and Harvard University have developed a new cryptographic system called Sieve that allows users to store and manage their personal data securely. With Sieve, users can control which apps have access to their data and revoke access with ease.

Kestrel 3000 Pocket Weather Meter

Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

Raising cryptography's standards

Researchers at MIT and Maynooth University developed a mathematical framework to calculate the minimum-security guarantees for any given encryption scheme. This allows information managers to make more informed decisions about how to protect data. The framework also applies to data privacy, enabling the modification or structuring of a...

Collecting digital user data without invading privacy

A team of computer scientists from Saarland University has developed a software system called Privada, which enables website owners to collect user data while protecting individual privacy. The system uses multi-party computation and perturbation to ensure that only trends in the aggregated statistic are preserved.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

New system allows cloud customers to detect program-tampering

A new system enables cloud customers to quickly verify the proper execution of their software, protecting against malicious code and ensuring data privacy. The system uses a practical, succinct zero-knowledge proof that can fit in a single data packet.

Thwarting the cleverest attackers

Researchers at MIT have developed a technique to mitigate side-channel attacks, which can steal computer secrets by analyzing time it takes for a computer to store data or measure its power consumption. This approach obscures computational details, making it difficult for attackers to infer information about the program.

Cryptographic attack highlights the importance of bug-free software

A new attack was discovered that can bypass security provided by OpenSSL, a widely used cryptography toolkit. The attack targets a specific version of the software and requires a specific set of options to work, but highlights the need for formal verification and correctness in open source software.

Computer scientist cracks mysterious 'Copiale Cipher'

A team of international researchers, led by computer scientist Kevin Knight, has finally broken the 75,000-character Copiale Cipher after centuries. The decoded message reveals rituals and political leanings of an 18th-century German secret society, shedding new light on its role in history.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

Major step ahead for cryptography

A new encryption scheme developed by Professor Nigel Smart allows for computations to be performed on encrypted data, enabling secure storage and access of sensitive information. This technology has the potential to revolutionize fields such as medical care research and electronic voting, while maintaining patient privacy.

Math plus cryptography equals drama and conflict

The intersection of mathematics and cryptography has significant implications for security and research, with mathematicians like Neal Koblitz contributing to the field. Koblitz's work highlights the challenges of 'provable security' in cryptography, as well as the influence of the National Security Agency on research.

How to leak a secret and not get caught

WikiLeaks, an online service designed to allow anyone to post sensitive government documents without being traced, is set to launch. The site aims to protect whistle-blowers and journalists from jail sentences for emailing sensitive information; however, concerns remain about the misuse of its anonymity feature.

Sony Alpha a7 IV (Body Only)

Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.

Updated federal guide on cryptography available

The NIST Special Publication 800-21-1 provides guidelines for implementing cryptography in the federal government. The publication aims to improve IT security and facilitate FISMA compliance among federal agencies, ensuring protection of sensitive information and systems.

Cryptography and coding for kids

Professors Vera Pless and Janet Beissinger create educational games to teach kids about cryptography and coding theory, making math accessible and fun. The project aims to help youngsters understand the importance of coding in business security and online safety.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.

You don't need to stop procrastinating

Researchers found that calculations taking longer than 26 months on current hardware are not worth starting. Instead, delaying until a more powerful computer is available can save time and resources. This strategy allows for optimal use of limited budgets for computers.