Bluesky Facebook Reddit Email

Life Sciences

Comprehensive exploration of living organisms, biological systems, and life processes across all scales from molecules to ecosystems. Encompasses cutting-edge research in biology, genetics, molecular biology, ecology, biochemistry, microbiology, botany, zoology, evolutionary biology, genomics, and biotechnology. Investigates cellular mechanisms, organism development, genetic inheritance, biodiversity conservation, metabolic processes, protein synthesis, DNA sequencing, CRISPR gene editing, stem cell research, and the fundamental principles governing all forms of life on Earth.

447,757 articles | 2542 topics

Health and Medicine

Comprehensive medical research, clinical studies, and healthcare sciences focused on disease prevention, diagnosis, and treatment. Encompasses clinical medicine, public health, pharmacology, epidemiology, medical specialties, disease mechanisms, therapeutic interventions, healthcare innovation, precision medicine, telemedicine, medical devices, drug development, clinical trials, patient care, mental health, nutrition science, health policy, and the application of medical science to improve human health, wellbeing, and quality of life across diverse populations.

431,843 articles | 751 topics

Social Sciences

Comprehensive investigation of human society, behavior, relationships, and social structures through systematic research and analysis. Encompasses psychology, sociology, anthropology, economics, political science, linguistics, education, demography, communications, and social research methodologies. Examines human cognition, social interactions, cultural phenomena, economic systems, political institutions, language and communication, educational processes, population dynamics, and the complex social, cultural, economic, and political forces shaping human societies, communities, and civilizations throughout history and across the contemporary world.

260,756 articles | 745 topics

Physical Sciences

Fundamental study of the non-living natural world, matter, energy, and physical phenomena governing the universe. Encompasses physics, chemistry, earth sciences, atmospheric sciences, oceanography, materials science, and the investigation of physical laws, chemical reactions, geological processes, climate systems, and planetary dynamics. Explores everything from subatomic particles and quantum mechanics to planetary systems and cosmic phenomena, including energy transformations, molecular interactions, elemental properties, weather patterns, tectonic activity, and the fundamental forces and principles underlying the physical nature of reality.

257,913 articles | 1552 topics

Applied Sciences and Engineering

Practical application of scientific knowledge and engineering principles to solve real-world problems and develop innovative technologies. Encompasses all engineering disciplines, technology development, computer science, artificial intelligence, environmental sciences, agriculture, materials applications, energy systems, and industrial innovation. Bridges theoretical research with tangible solutions for infrastructure, manufacturing, computing, communications, transportation, construction, sustainable development, and emerging technologies that advance human capabilities, improve quality of life, and address societal challenges through scientific innovation and technological progress.

225,386 articles | 998 topics

Scientific Community

Study of the practice, culture, infrastructure, and social dimensions of science itself. Addresses how science is conducted, organized, communicated, and integrated into society. Encompasses research funding mechanisms, scientific publishing systems, peer review processes, academic ethics, science policy, research institutions, scientific collaboration networks, science education, career development, research programs, scientific methods, science communication, and the sociology of scientific discovery. Examines the human, institutional, and cultural aspects of scientific enterprise, knowledge production, and the translation of research into societal benefit.

193,043 articles | 157 topics

Space Sciences

Comprehensive study of the universe beyond Earth, encompassing celestial objects, cosmic phenomena, and space exploration. Includes astronomy, astrophysics, planetary science, cosmology, space physics, astrobiology, and space technology. Investigates stars, galaxies, planets, moons, asteroids, comets, black holes, nebulae, exoplanets, dark matter, dark energy, cosmic microwave background, stellar evolution, planetary formation, space weather, solar system dynamics, the search for extraterrestrial life, and humanity's efforts to explore, understand, and unlock the mysteries of the cosmos through observation, theory, and space missions.

29,662 articles | 175 topics

Research Methods

Comprehensive examination of tools, techniques, methodologies, and approaches used across scientific disciplines to conduct research, collect data, and analyze results. Encompasses experimental procedures, analytical methods, measurement techniques, instrumentation, imaging technologies, spectroscopic methods, laboratory protocols, observational studies, statistical analysis, computational methods, data visualization, quality control, and methodological innovations. Addresses the practical techniques and theoretical frameworks enabling scientists to investigate phenomena, test hypotheses, gather evidence, ensure reproducibility, and generate reliable knowledge through systematic, rigorous investigation across all areas of scientific inquiry.

21,889 articles | 139 topics

Mathematics

Study of abstract structures, patterns, quantities, relationships, and logical reasoning through pure and applied mathematical disciplines. Encompasses algebra, calculus, geometry, topology, number theory, analysis, discrete mathematics, mathematical logic, set theory, probability, statistics, and computational mathematics. Investigates mathematical structures, theorems, proofs, algorithms, functions, equations, and the rigorous logical frameworks underlying quantitative reasoning. Provides the foundational language and tools for all scientific fields, enabling precise description of natural phenomena, modeling of complex systems, and the development of technologies across physics, engineering, computer science, economics, and all quantitative sciences.

3,023 articles | 113 topics

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

AI should be better understood and managed – new research warns

A Lancaster University academic argues that AI and algorithms contribute to polarization, radicalism, and political violence, posing a threat to national security. The paper examines how AI has been securitized throughout its history, highlighting the need for better understanding and management of its risks.

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.

Monitoring nuclear weapons stockpiles with radio waves

A new monitoring system uses radio waves to track changes in a room's nuclear weapons stockpile, providing a secure way to verify compliance with disarmament treaties. The system combines cyber-physical security assessments with cross-system physics to enable new levels of trust in the Internet of Things.

Apple’s Safari browser is still vulnerable to Spectre attacks

A recent study has shown that Apple's Safari browser is still vulnerable to Spectre attacks, allowing hackers to access sensitive data such as passwords and emails. Researchers from Ruhr-University Bochum found that attackers can bypass security measures in the browser to intercept and exploit user data.

NSF backs Rice processor design, chip security research

Researchers aim to develop programmable formal specification-based data stream processor and hardware monitor to enhance microchip security and prevent malfunctions. They will explore novel technologies for real-time monitoring of physical and biological systems, including signal patterns within computer chips.

AI: Elias puts UniTrento on the European map of innovation

The University of Trento coordinates a European research network, Elias, aiming to establish Europe as a leader in AI research. The project focuses on developing new computational systems and models for sustainable innovation, social cohesion, and reliable AI.

Sony Alpha a7 IV (Body Only)

Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.

Better cybersecurity with new material

Researchers at Linköping University develop a new type of quantum random number generator based on perovskite light emitting diodes, providing improved randomness and security. The technology has the potential to be cheaper and more environmentally friendly than traditional methods.

Virtual institute at the University of Kansas to combat cyber threats

The University of Kansas has established a virtual institute to train leaders in cybersecurity and electromagnetic spectrum research, partnering with Ohio State and Purdue universities. The VICEROY Virtual Institute will offer courses, scholarships, and hands-on training to combat growing cyber threats.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Smart devices: Putting a premium on peace of mind

A new program aims to label smart devices with certain cybersecurity standards, allowing consumers to make informed choices. However, the effectiveness of these labels in protecting consumers from cyber threats is uncertain.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

Researchers strengthen defenses against common cyberattack

Scientists at PNNL developed a new technique to detect denial-of-service attacks, which improved detection accuracy by 90% compared to current methods. The technique focuses on the evolution of entropy, a measure of disorder in a system, and is automated, requiring minimal computing power or network resources.

Aranet4 Home CO2 Monitor

Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.

Why computer security advice is more confusing than it should be

A new study highlights the key problem with how computer security guidelines are created, citing complexity and lack of prioritization as major issues. Researchers recommend curating information and using clear messaging to make guidelines more accessible and user-friendly.

A new way to look at data privacy

Researchers create a new privacy metric, Probably Approximately Correct (PAC) Privacy, that enables the addition of minimal noise to protect sensitive data. The algorithm automatically determines the optimal amount of noise needed without requiring knowledge of the inner workings of the model or training process.

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

Satellite security lags decades behind the state of the art

Researchers found that many satellites lack basic security concepts, such as separation of code and data, and rely on obscurity to ensure security. The team conducted a thorough analysis of three low-earth orbit satellites and identified vulnerabilities that could be exploited by hackers.

Leading the way to cyber safety on roads and highways

The University of Houston's CYBER-CARE research center aims to prevent cyberattacks that could compromise the safe movement of people and goods in the US. The center will focus on four goals, including exploring advanced theories to mitigate the impact of large-scale cyberattacks.

Stressed for a bit? Then don’t click it, cybersecurity experts advise

A study by Pacific Northwest National Laboratory found that workers experiencing high levels of work-related distress are more likely to fall victim to phishing attacks. The researchers identified a statistically significant relationship between stress and response to simulated phishing emails, with every one-point increase in self-rep...

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.

How secure are voice authentication systems really?

Researchers at the University of Waterloo discovered a method to bypass voice authentication security systems with high accuracy. They found that malicious actors can generate convincing copies of a victim's voice using deepfake software, evading existing spoofing countermeasures.

Gebril hunting threats in computer network traffic

A researcher at George Mason University is conducting threat hunting operations on large datasets of suspicious network traffic. The project aims to develop an alert system and improve incident response capabilities, with funding from the Virginia Innovation Partnership Authority.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

Using quantum physics to secure wireless devices

Researchers at University of Illinois Chicago develop a method inspired by quantum physics to improve wireless device identification and protect device-to-device communication. They create a hardware encryption system using a truly random and unique digital fingerprint, making it virtually unbreakable.

Simulating a secure future

A recent project at KAUST has reported multifunctional logic gates that offer users a range of hardware security advantages, including tamper protection and watermarking. The gates use spintronic devices called magnetic tunnel junctions, which can be easily switchable and obscure their layout, making them hard to reverse engineer.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

A fresh approach to new and secure encryption

SymTrust project aims to develop new symmetric cryptography methods based on sound security arguments, balancing efficiency and security. Researchers will study existing ciphers and conditions of cryptanalysis to set new standards in information encryption.

What do you do if a hacker takes over your ship?

A new course at Norwegian University of Science and Technology teaches risk management and resilience in maritime digital security. Despite the importance of training, many deck officers reported uncertainty about handling cyber incidents on board.

Detecting manipulations in microchips

Researchers at Ruhr University Bochum detected deviations in 37 out of 40 chips, with a high detection rate achieved through clean room conditions and optimized algorithms. The team released their findings and analysis tools online for further study.

GQ GMC-500Plus Geiger Counter

GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.

Security vulnerabilities detected in drones made by DJI

Researchers detected 16 security vulnerabilities in DJI drones, including the ability to change serial numbers, override tracking mechanisms, and crash flying drones mid-air. The DJI Mini 2, Air 2, and Mavic 3 models were found to have four severe flaws.

How digital twins could protect manufacturers from cyberattacks

A new cybersecurity framework uses digital twin technology, machine learning, and human expertise to detect cyberattacks in manufacturing processes. The framework analyzes continuous data streams from physical machines and their digital twins to identify irregularities and flag potential threats.

US Census data vulnerable to attack without enhanced privacy measures

Computer scientists designed a reconstruction attack that proves US Census data can be exposed and stolen with current privacy measures. The study demonstrates risks to individual respondents' privacy, highlighting the need for differential privacy techniques to protect sensitive information.

Kestrel 3000 Pocket Weather Meter

Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.

Matrix multiplications at the speed of light

Researchers have developed a compact silicon photonic compute engine capable of computing tiled matrix multiplications at a record-high 50 GHz clock frequency. This achievement promises to contribute significantly to data center cybersecurity and enables real-time threat detection for malicious packets.

Fear can inspire remote workers to protect IT resources

A study found that remote workers are more likely to protect IT resources when faced with fear and a clear understanding of potential security threats. Employers can encourage secure behaviors by clearly communicating threats and promoting self-efficacy, and also consider integrating stewardship theory to promote a sense of collectivism.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

A faster way to preserve privacy online

Researchers at MIT have developed a scheme for private information retrieval that is about 30 times faster than other comparable methods. The technique enables users to search an online database without revealing their query to the server, with potential applications in private communication and targeted advertising.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.

Simple hardware to defend microgrid attacks

Scientists at KAUST created a novel approach to secure microgrids by embedding hardware performance counters in solar inverters. This innovative solution can detect malware with over 97% accuracy using time series classifiers, providing an effective defense countermeasure for low-cost and low-complexity.

Researchers use blockchain to increase electric grid resiliency

A team of researchers has developed a framework using blockchain technology to track device communications on the electric grid, detecting anomalies such as data manipulation and spoofing. This approach increases grid resiliency and allows for rapid response to cyberattacks or equipment failures.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.