Bluesky Facebook Reddit Email

Life Sciences

Comprehensive exploration of living organisms, biological systems, and life processes across all scales from molecules to ecosystems. Encompasses cutting-edge research in biology, genetics, molecular biology, ecology, biochemistry, microbiology, botany, zoology, evolutionary biology, genomics, and biotechnology. Investigates cellular mechanisms, organism development, genetic inheritance, biodiversity conservation, metabolic processes, protein synthesis, DNA sequencing, CRISPR gene editing, stem cell research, and the fundamental principles governing all forms of life on Earth.

447,757 articles | 2542 topics

Health and Medicine

Comprehensive medical research, clinical studies, and healthcare sciences focused on disease prevention, diagnosis, and treatment. Encompasses clinical medicine, public health, pharmacology, epidemiology, medical specialties, disease mechanisms, therapeutic interventions, healthcare innovation, precision medicine, telemedicine, medical devices, drug development, clinical trials, patient care, mental health, nutrition science, health policy, and the application of medical science to improve human health, wellbeing, and quality of life across diverse populations.

431,843 articles | 751 topics

Social Sciences

Comprehensive investigation of human society, behavior, relationships, and social structures through systematic research and analysis. Encompasses psychology, sociology, anthropology, economics, political science, linguistics, education, demography, communications, and social research methodologies. Examines human cognition, social interactions, cultural phenomena, economic systems, political institutions, language and communication, educational processes, population dynamics, and the complex social, cultural, economic, and political forces shaping human societies, communities, and civilizations throughout history and across the contemporary world.

260,756 articles | 745 topics

Physical Sciences

Fundamental study of the non-living natural world, matter, energy, and physical phenomena governing the universe. Encompasses physics, chemistry, earth sciences, atmospheric sciences, oceanography, materials science, and the investigation of physical laws, chemical reactions, geological processes, climate systems, and planetary dynamics. Explores everything from subatomic particles and quantum mechanics to planetary systems and cosmic phenomena, including energy transformations, molecular interactions, elemental properties, weather patterns, tectonic activity, and the fundamental forces and principles underlying the physical nature of reality.

257,913 articles | 1552 topics

Applied Sciences and Engineering

Practical application of scientific knowledge and engineering principles to solve real-world problems and develop innovative technologies. Encompasses all engineering disciplines, technology development, computer science, artificial intelligence, environmental sciences, agriculture, materials applications, energy systems, and industrial innovation. Bridges theoretical research with tangible solutions for infrastructure, manufacturing, computing, communications, transportation, construction, sustainable development, and emerging technologies that advance human capabilities, improve quality of life, and address societal challenges through scientific innovation and technological progress.

225,386 articles | 998 topics

Scientific Community

Study of the practice, culture, infrastructure, and social dimensions of science itself. Addresses how science is conducted, organized, communicated, and integrated into society. Encompasses research funding mechanisms, scientific publishing systems, peer review processes, academic ethics, science policy, research institutions, scientific collaboration networks, science education, career development, research programs, scientific methods, science communication, and the sociology of scientific discovery. Examines the human, institutional, and cultural aspects of scientific enterprise, knowledge production, and the translation of research into societal benefit.

193,043 articles | 157 topics

Space Sciences

Comprehensive study of the universe beyond Earth, encompassing celestial objects, cosmic phenomena, and space exploration. Includes astronomy, astrophysics, planetary science, cosmology, space physics, astrobiology, and space technology. Investigates stars, galaxies, planets, moons, asteroids, comets, black holes, nebulae, exoplanets, dark matter, dark energy, cosmic microwave background, stellar evolution, planetary formation, space weather, solar system dynamics, the search for extraterrestrial life, and humanity's efforts to explore, understand, and unlock the mysteries of the cosmos through observation, theory, and space missions.

29,662 articles | 175 topics

Research Methods

Comprehensive examination of tools, techniques, methodologies, and approaches used across scientific disciplines to conduct research, collect data, and analyze results. Encompasses experimental procedures, analytical methods, measurement techniques, instrumentation, imaging technologies, spectroscopic methods, laboratory protocols, observational studies, statistical analysis, computational methods, data visualization, quality control, and methodological innovations. Addresses the practical techniques and theoretical frameworks enabling scientists to investigate phenomena, test hypotheses, gather evidence, ensure reproducibility, and generate reliable knowledge through systematic, rigorous investigation across all areas of scientific inquiry.

21,889 articles | 139 topics

Mathematics

Study of abstract structures, patterns, quantities, relationships, and logical reasoning through pure and applied mathematical disciplines. Encompasses algebra, calculus, geometry, topology, number theory, analysis, discrete mathematics, mathematical logic, set theory, probability, statistics, and computational mathematics. Investigates mathematical structures, theorems, proofs, algorithms, functions, equations, and the rigorous logical frameworks underlying quantitative reasoning. Provides the foundational language and tools for all scientific fields, enabling precise description of natural phenomena, modeling of complex systems, and the development of technologies across physics, engineering, computer science, economics, and all quantitative sciences.

3,023 articles | 113 topics

Security analysis of blockchain-based cryptocurrency

Researchers investigate real-world blockchain security incidents to extract representative attack patterns and categorize them into six classes based on standard blockchain architecture layers. The study also evaluates current detection and defense strategies, highlighting their strengths and limitations.

Misleading text in the physical world can hijack AI-enabled robots

Researchers have identified a new vulnerability in AI-powered robots, where malicious text on signs or objects can hijack their decision-making. The study, led by UC Santa Cruz professors Alvaro Cardenas and Cihang Xie, presents the first academic exploration of environmental indirect prompt injection attacks against embodied AI systems.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Agents team up to strengthen AI safety checks

A new approach uses multiple LLM agents collaborating through iterative interactions to improve AI safety checks, outperforming existing methods in F1-score and achieving better trade-offs between catching harmful and harmless prompts. The system divides work into two teams: generator and analyzer, with logs capturing past mistakes and...

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

What does cybersecurity look like in the quantum age?

A recent paper highlights the need for defense mechanisms covering software, programs, and physical components of quantum computing systems. Key findings include the risk of crosstalk, intellectual property theft, and lack of end-to-end protection, emphasizing the need for safeguarding quantum computers from ground up.

CISPA researcher Andreas Zeller named IEEE Fellow

Andreas Zeller recognized for his work on automated debugging and security testing, with a total of nine Test of Time Awards. He is one of the few researchers to receive two ERC Advanced Grants from the European Research Council.

Securing AI systems against growing cybersecurity threats

The SHASAI project addresses cybersecurity risks in AI systems from design to real-world operation, combining secure hardware and software, risk-driven engineering, and real-world validation. The project will demonstrate its methods and tools in three diverse scenarios, supporting Europe's efforts to promote trustworthy AI.

Apple AirPods Pro (2nd Generation, USB-C)

Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.

ACM honors 2025 Distinguished Members for driving the future of computing

The Association for Computing Machinery has named 61 new Distinguished Members, recognized for their contributions to AI for healthcare, data management, human-computer interaction, and other areas. The recipients include experts from top universities, corporations, and research institutions worldwide.

ERC Consolidator Grant awarded to CISPA researcher Rayna Dimitrova

Rayna Dimitrova's SyReP project aims to eliminate the separation between decision-making and data in software development, enabling developers to specify system behavior and generate implementation automatically. The ERC Consolidator Grant will support her research on novel symbolic algorithms and realizability certificates.

Online tracking and privacy on hospital websites

Researchers analyzed 12 years of hospital website data and found pixel tracking in 66% of observations, significantly increasing breach risk. Hospitals using third-party pixels saw a 1.4 percentage point increase in breach probability compared to baseline rates.

Stress and a toxic workplace culture can cause insider cybersecurity threats

A new study by Emmanuel Anti at the University of Vaasa suggests that empathetic security models can strengthen cybersecurity practices and prevent insider threats. The research proposes co-creating cybersecurity policies with employees, focusing on understanding their needs, motivations, and emotional well-being.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.

Smartphone sharing demands a new approach to cybersecurity

A study by Griffith University researchers reveals that smartphone sharing is a growing issue, with 20% of identity theft perpetrators being current or former intimate partners. The study argues that one-user/one-device threat models are inadequate for addressing interpersonal cybersecurity risks.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

SwRI identifies security vulnerability in EV charging protocol

Researchers at SwRI discovered a security vulnerability in the Signal Level Attenuation Characterization (SLAC) protocol used in electric vehicle-to-grid communications. The team successfully modeled and replicated a machine-in-the-middle attack that could manipulate or halt EV charging processes.

Garmin GPSMAP 67i with inReach

Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

University of Tennessee's Kim receives ACM CCS Distinguished Paper Award

Doowon Kim, an assistant professor at the University of Tennessee, received a prestigious award from ACM CCS for his decade-long study on Advanced Persistent Threats (APTs). His research provides a comprehensive understanding of APT evolution and global patterns, shedding new light on these sophisticated cyberattacks.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.

How can (A)I help you?

A new study by Yifan Yu offers guidance on how to deploy emotion AI in various scenarios, emphasizing the importance of balancing human involvement with AI's emotional detection capabilities. The analysis showed that emotion AI works best when integrated with human employees, and some scenarios are better handled by humans alone.

Training the grid to spot cyberattacks without seeing your data

Researchers developed a cyberattack detection system that uses federated learning and cloud coordination to detect DDoS attacks in 6G-ready smart grids without exposing user energy-use data. The system achieved high accuracy and precision, but trade-offs were observed in terms of resources consumption.

Illinois Chat is launched for campus community

The platform allows users to create personalized LLM-based chatbots, serving as a 24/7 teaching assistant or scraping campus websites to find needed resources. Illinois Chat has already been utilized in various departments and research groups, providing valuable feedback to make it more practical.

Aranet4 Home CO2 Monitor

Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.

New framework could defend factories from cyber-attacks

Researchers at Texas A&M University have developed a new framework to protect industrial processing facilities from cyber threats. The framework identifies vulnerabilities, detects abnormal activity in real-time, and provides safeguards and mitigation strategies to maintain safe operations.

Hardware vulnerability allows attackers to hack AI training data

Researchers at NC State University identified a hardware vulnerability that allows attackers to compromise AI privacy by exploiting ML accelerator behavior. The GATEBLEED vulnerability exploits power gating in AI accelerators, creating an observable timing channel for attackers.

FIU cybersecurity researchers develop midflight defense against drone hijacking

Florida International University researchers have developed a defensive system called SHIELD that can detect and neutralize cyberattacks on drones in real time. The system allows the drone to finish its mission while providing robust recovery mechanisms, making it crucial for securing commercial drone use across industries.

Fluke 87V Industrial Digital Multimeter

Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.

Scientists develop end-to-end encryption for git services

Researchers at the University of Sydney have developed end-to-end encryption for git services, protecting sensitive code from cybersecurity threats. The encryption aligns seamlessly with existing platforms like Github and Bitbucket, reducing computational resources needed while encrypting only edits.

Next-generation quantum communication

The researchers have successfully demonstrated a four-dimensional QKD system with high efficiency and low measurement error rates. This breakthrough enables secure data transmission over long distances, with potential applications in fields such as finance and government.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

From black box to glass box: AI explainability in stroke treatment

Liberate AI project develops an AI model capable of predicting long-term outcomes and potential complications in ischemic stroke patients. The model will be trained using Swarm Learning technology, aiming for explainability and transparency, while striking a balance between these features and accuracy.

Forget numbers: your PIN could consist of a shimmy and a shake

Researchers at UBC have developed a new NFC-based gesture system that can distinguish between nine distinct gestures with high accuracy. This technology has the potential to improve accessibility for users with mobility issues and reduce the spread of germs through touchpads.

Sony Alpha a7 IV (Body Only)

Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.

CalDigit TS4 Thunderbolt 4 Dock

CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.

New College of AI, Cyber and Computing launched at UT San Antonio

The University of Texas at San Antonio has launched the College of AI, Cyber and Computing, which will serve over 5,000 students pursuing degrees in rapidly growing career fields. The college is positioned to advance technological education and research, with faculty securing major grants and launching industry partnerships.

UCR researchers fortify AI against rogue rewiring

Researchers at UCR have developed a method to preserve AI safeguards in open-source models by retraining internal structure to detect and block dangerous prompts. The approach avoids external filters or software patches, instead changing the model's fundamental understanding of risky content.

Google.org backs the Wits MIND Institute with US$1M boost

The Wits MIND Institute has received a $1 million boost from Google.org, enabling it to drive next-generation breakthroughs in natural and artificial intelligence. The partnership aims to advance the scientific understanding of both natural and artificial intelligence, foster breakthrough research and technological innovation.

A new attack reshapes the rules of Bitcoin mining

A new attack, Infiltrated Selfish Mining (ISM), could reshape the rules of Bitcoin mining by allowing attackers to profit simultaneously. ISM avoids the miner's dilemma and yields up to 1.52 times more rewards than previous attacks.

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

Login system helps spot online hacks without sacrificing privacy

A new login system called Client-Side Encrypted Access Logging (CSAL) detects online account compromise without exposing personal devices to invasive tracking. The system verifies whether a login came from a user's own device, addressing a flaw in how major platforms log account access.

The 12th Heidelberg Laureate Forum begins September 14

The 12th Heidelberg Laureate Forum brings together 200 young mathematicians and computer scientists with 29 distinguished laureates to exchange ideas and discuss pressing issues in their fields. The event features a diverse range of lectures, talks, and panel discussions.

Celestron NexStar 8SE Computerized Telescope

Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.