Bluesky Facebook Reddit Email

Detecting and mitigating network attacks with a multi-prong approach

A team of researchers has developed a novel attack detection scheme that captures vulnerable communication links, allowing systems to react optimally even under attack. The approach uses an adaptive observer to detect the onset of attacks and learns how they disrupt the system, enabling it to perform better under duress.

Can artificial intelligence tell a polar bear from a can opener?

A recent UCLA study found that artificial intelligence, specifically deep learning computer networks, have severe limitations in distinguishing objects. The researchers demonstrated that these machines can be easily fooled, and their method of identifying objects using computer vision differs substantially from human vision.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

Tiny camera lens may help link quantum computers to network

A tiny camera lens invented by ANU researchers may enable fast and reliable transfer of quantum information between quantum computers and an optical fibre network. The device uses a metasurface that controls light with functionalities outperforming traditional systems.

AI-based framework creates realistic textures in the virtual world

A new AI-based framework has been developed to create realistic textures in virtual worlds, addressing the challenge of designing complex and believable textures. The tool uses generative adversarial networks (GANs) to train computers to expand small textures into larger ones, resulting in efficient and realistic designs.

Learning a scene that's unseen, without human help

Researchers at Google DeepMind created a machine-learning system called Generative Query Network (GQN) that learns 3-D scene composition from limited 2-D images. The GQN can generate predicted images of unseen scenes from different viewpoints, allowing for autonomous learning without human supervision.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

New research could improve wireless sensing and communication

Researchers at Binghamton University are developing a micro-device using bio-photovoltaic technology to create self-sustaining wireless sensor networks. The project aims to harness energy from biological photosynthesis to improve wireless sensing and communication, with potential applications in various industries.

Emphasizing the auto in automobile: A unified approach for automated vehicles

A team of researchers from Cranfield University and Chinese institutions developed a framework combining cyber, physical, and social systems to integrate vehicle connectivity and automation attributes. They proposed the use of parallel learning theory to analyze information regarding vehicle, human driver, and driving actions in parallel.

'Instant replay' for computer systems shows cyber attack details

Researchers at Georgia Institute of Technology develop 'Refinable Attack INvestigation' (RAIN) software to automate cyber attack investigation. The system provides a detailed record of intrusions, even if attackers covered their tracks, allowing investigators to quickly identify the extent and impact of network or computer system attacks.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Monitoring network traffic more efficiently

Researchers at MIT and Cisco Systems have developed a new approach to network monitoring called Marple, which allows routers to report on their own state without relying on external servers. By using a programming language and simple circuit design, Marple enables precise traffic analysis while reducing the need for additional hardware.

Researchers land $3 million to build cyberattack defenses

A nationwide team of security experts, led by Clemson University's Hongxin Hu, is developing a new operating system to fundamentally change how large computer and network systems are built, making data more secure. The S2OS system could be transformative for cloud computing, protecting users' data from cyber threats.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

Algorithm can create a bridge between Clinton and Trump supporters

A study at Aalto University aims to reduce societal polarization by connecting people with opposing views on Twitter. The algorithm suggests bridges between users of opposing sides, such as Hillary Clinton and Donald Trump, to provide recommendations about who to retweet.

World's first parallel computer based on biomolecular motors

Researchers develop new parallel-computing method using nanofabricated channels explored by protein filaments propelled by molecular motors, solving combinatorial problems in a dramatic improvement over conventional computers. The approach is fully scalable with existing technologies and uses orders of magnitude less energy.

Closing a malware security loophole

A new antivirus add-on can scan across computer networks and trap malicious activity missed by system firewalls, offering improved protection against malware. The system adds little computing overhead and can block malware before it causes harm or spreads to other machines.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

Research could lead to dramatic energy savings at data farms

Researchers at Washington State University have developed a wireless network on a computer chip that can reduce energy consumption in data farms. The technology allows for wireless links between cores, resulting in less energy loss and higher data transfer speed.

UMD-led public computational biology web service gains popularity

A UMD-led public computational biology web service, MolecularEvolution.org, has gained popularity by giving back to its users. The Lattice Project, built on the Berkeley Open Infrastructure for Network Computing, offers a service called GARLI, designed to reconstruct and predict genetic relationships between biological samples.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.

Keywords hold vocabulary together in memory

Researchers found keywords in word networks that facilitate quick recognition of similar words, opening up potential applications for language disorders and learning. Removing keywords from memory could disrupt language processing.

New approach to vertex connectivity could maximize networks' bandwidth

Researchers have developed a new technique for addressing vertex-connectivity problems, which could lead to communications protocols that coax as much bandwidth as possible from networks. The approach is based on decomposing the network into connected dominating sets, allowing for faster information flow and increased robustness.

The heat is on...or off

Researchers use existing IT infrastructure to monitor office occupancy and adjust temperature controls, reducing energy waste. The approach involves analyzing network addresses and device activity to estimate user locations, enabling more efficient heating and cooling systems.

Paper-thin e-skin responds to touch by lighting up

Engineers at UC Berkeley created the first user-interactive sensor network on flexible plastic, responding to touch with instant light emission. The new e-skin technology has potential applications in robots, wallpapers, dashboard displays, and health monitors.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

UA's Marwan Krunz chalks up another engineering honor with IEEE Award

Marwan Krunz, a professor at the University of Arizona, has been named a distinguished lecturer by the Institute of Electrical and Electronics Engineers (IEEE) for his research on optimal resource allocation and adaptive control. He will share his expertise on dynamic spectrum access models to overcome wireless spectrum shortages.

AmScope B120C-5M Compound Microscope

AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.

Researchers boost efficiency of multi-hop wireless networks

A new data transmission approach developed by researchers at North Carolina State University can increase the amount of data transmitted in multi-hop wireless networks by 20-80%. The centrality-based power control algorithm optimizes system efficiency by determining when to use powerful transmissions and when to use less powerful ones.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

MIT: Simple security for wireless

MIT researchers have developed a new security scheme that can automatically create connections between wireless devices and defend against man-in-the-middle (MITM) attacks. The scheme uses novel techniques to detect and prevent MITM attacks, making it stronger than previous solutions.

Thwarting attacks on cell phone mesh networks

Researchers have developed a computer algorithm to identify and block distributed denial-of-service (DDoS) attacks on mobile ad hoc networks in under 22 seconds. The technique can halt 80% of attack traffic and provide a model framework for building better security systems.

CalDigit TS4 Thunderbolt 4 Dock

CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.

Researcher to track spread of disease, malware and power outages

A researcher at Virginia Tech is developing a unified mathematical framework to study the spread of pandemics, malware, and power grid failures. The framework aims to improve robustness in healthcare, computer networking, and power grid controls, addressing concerns for workers and policy planners.

Apple AirPods Pro (2nd Generation, USB-C)

Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.

Code defends against 'stealthy' computer worms

Researchers developed an algorithm to target local scanning worms, which can evade worm defenses. The algorithm estimates susceptible host population size and quarantines the worm if scans exceed a threshold value.

Slime design mimics Tokyo's rail system

Researchers found that slime mold can self-organize into a nearly identical network to Tokyo's rail system, suggesting improved technological systems. The model captures the basic dynamics of network adaptability through interaction of local rules.

Kestrel 3000 Pocket Weather Meter

Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.

Ants vs. worms: New computer security mimics nature

A new computer security approach, called 'swarm intelligence,' uses digital ants to search for threats in large networks, adapting to changes and attracting human operators to investigate. This method promises to transform cyber security by rapidly responding to emerging threats and improving overall defense.

Toward cheap underwater sensor nets

Researchers at UC San Diego are building low-cost, low-power modems for short-range underwater networking, enabling higher sampling rates and more frequent data collection. The project aims to create a network of underwater sensors that can provide real-time environmental data, revolutionizing the way we understand our natural world.

Low-cost strategy developed for curbing computer worms

Researchers at University of California, Davis have developed a 2-pronged approach to ward off self-propagating infectious programs known as worms. The strategy enables computers to share information about anomalous activity and use an algorithm to weigh the cost of infection against the benefit of staying online.

Celestron NexStar 8SE Computerized Telescope

Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.

How secure is your network? NIST model knows

The NIST model assigns a probable risk of attack to guide IT managers in securing their networks by analyzing all possible paths that system attackers could penetrate through. This allows decision makers to make wise decisions and investments to protect their network from data breaches.

New insights into the dynamics of the brain's cortex

A study published in PLOS ONE demonstrates that the spontaneous activity of small neuronal networks in the cortex consists of highly structured patterns rather than random noise. These patterns are shaped by network connectivity and can be used to inform researchers about the underlying anatomy.

Prices at the push of a button

A networked electronic display system allows store managers to quickly update prices on displays via a central computer, eliminating the need for physical price tag changes. The system uses small data packages transmitted between receivers and transmitters, ensuring fast and reliable price updates.

Music hath charms to probe the brain's auditory circuitry

The study explores how the brain processes musical movements and transitions, finding two distinct networks involved in perceiving these events. The ventral region detects salient events, while the dorsal region focuses attention on event boundaries, forming a tightly coupled network that maintains attention during movement transitions.

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.

Stevens professor awarded Office of Naval Research grant

A Stevens Institute of Technology professor has been awarded a grant from the Office of Naval Research to develop more efficient energy-sensitive sensor networks for the US military. The project aims to improve sensor performance and reduce energy consumption in these critical systems.

Sky & Telescope Pocket Sky Atlas, 2nd Edition

Sky & Telescope Pocket Sky Atlas, 2nd Edition is a durable star atlas for planning sessions, identifying targets, and teaching celestial navigation.