Bluesky Facebook Reddit Email

Life Sciences

Comprehensive exploration of living organisms, biological systems, and life processes across all scales from molecules to ecosystems. Encompasses cutting-edge research in biology, genetics, molecular biology, ecology, biochemistry, microbiology, botany, zoology, evolutionary biology, genomics, and biotechnology. Investigates cellular mechanisms, organism development, genetic inheritance, biodiversity conservation, metabolic processes, protein synthesis, DNA sequencing, CRISPR gene editing, stem cell research, and the fundamental principles governing all forms of life on Earth.

447,757 articles | 2542 topics

Health and Medicine

Comprehensive medical research, clinical studies, and healthcare sciences focused on disease prevention, diagnosis, and treatment. Encompasses clinical medicine, public health, pharmacology, epidemiology, medical specialties, disease mechanisms, therapeutic interventions, healthcare innovation, precision medicine, telemedicine, medical devices, drug development, clinical trials, patient care, mental health, nutrition science, health policy, and the application of medical science to improve human health, wellbeing, and quality of life across diverse populations.

431,843 articles | 751 topics

Social Sciences

Comprehensive investigation of human society, behavior, relationships, and social structures through systematic research and analysis. Encompasses psychology, sociology, anthropology, economics, political science, linguistics, education, demography, communications, and social research methodologies. Examines human cognition, social interactions, cultural phenomena, economic systems, political institutions, language and communication, educational processes, population dynamics, and the complex social, cultural, economic, and political forces shaping human societies, communities, and civilizations throughout history and across the contemporary world.

260,756 articles | 745 topics

Physical Sciences

Fundamental study of the non-living natural world, matter, energy, and physical phenomena governing the universe. Encompasses physics, chemistry, earth sciences, atmospheric sciences, oceanography, materials science, and the investigation of physical laws, chemical reactions, geological processes, climate systems, and planetary dynamics. Explores everything from subatomic particles and quantum mechanics to planetary systems and cosmic phenomena, including energy transformations, molecular interactions, elemental properties, weather patterns, tectonic activity, and the fundamental forces and principles underlying the physical nature of reality.

257,913 articles | 1552 topics

Applied Sciences and Engineering

Practical application of scientific knowledge and engineering principles to solve real-world problems and develop innovative technologies. Encompasses all engineering disciplines, technology development, computer science, artificial intelligence, environmental sciences, agriculture, materials applications, energy systems, and industrial innovation. Bridges theoretical research with tangible solutions for infrastructure, manufacturing, computing, communications, transportation, construction, sustainable development, and emerging technologies that advance human capabilities, improve quality of life, and address societal challenges through scientific innovation and technological progress.

225,386 articles | 998 topics

Scientific Community

Study of the practice, culture, infrastructure, and social dimensions of science itself. Addresses how science is conducted, organized, communicated, and integrated into society. Encompasses research funding mechanisms, scientific publishing systems, peer review processes, academic ethics, science policy, research institutions, scientific collaboration networks, science education, career development, research programs, scientific methods, science communication, and the sociology of scientific discovery. Examines the human, institutional, and cultural aspects of scientific enterprise, knowledge production, and the translation of research into societal benefit.

193,043 articles | 157 topics

Space Sciences

Comprehensive study of the universe beyond Earth, encompassing celestial objects, cosmic phenomena, and space exploration. Includes astronomy, astrophysics, planetary science, cosmology, space physics, astrobiology, and space technology. Investigates stars, galaxies, planets, moons, asteroids, comets, black holes, nebulae, exoplanets, dark matter, dark energy, cosmic microwave background, stellar evolution, planetary formation, space weather, solar system dynamics, the search for extraterrestrial life, and humanity's efforts to explore, understand, and unlock the mysteries of the cosmos through observation, theory, and space missions.

29,662 articles | 175 topics

Research Methods

Comprehensive examination of tools, techniques, methodologies, and approaches used across scientific disciplines to conduct research, collect data, and analyze results. Encompasses experimental procedures, analytical methods, measurement techniques, instrumentation, imaging technologies, spectroscopic methods, laboratory protocols, observational studies, statistical analysis, computational methods, data visualization, quality control, and methodological innovations. Addresses the practical techniques and theoretical frameworks enabling scientists to investigate phenomena, test hypotheses, gather evidence, ensure reproducibility, and generate reliable knowledge through systematic, rigorous investigation across all areas of scientific inquiry.

21,889 articles | 139 topics

Mathematics

Study of abstract structures, patterns, quantities, relationships, and logical reasoning through pure and applied mathematical disciplines. Encompasses algebra, calculus, geometry, topology, number theory, analysis, discrete mathematics, mathematical logic, set theory, probability, statistics, and computational mathematics. Investigates mathematical structures, theorems, proofs, algorithms, functions, equations, and the rigorous logical frameworks underlying quantitative reasoning. Provides the foundational language and tools for all scientific fields, enabling precise description of natural phenomena, modeling of complex systems, and the development of technologies across physics, engineering, computer science, economics, and all quantitative sciences.

3,023 articles | 113 topics

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

A cryptography game-changer for biomedical research at scale

Researchers have developed a federated analytics system, FAMHE, that enables healthcare providers to collaborate on statistical analyses and machine learning models without exchanging underlying datasets. The system has been proven mathematically secure and accurately reproduced published studies in multi-centric settings.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Designing ‘smart’ security for smart devices

Researchers aim to create a flexible security feature that learns from past cyberattacks and requires minimal human intervention. They'll collaborate with device developers to share solutions and improve future responses to attacks.

Researchers develop toolkit to test apple security, find vulnerability

Researchers from North Carolina State University developed a software toolkit to test Apple device security, identifying a previously unknown vulnerability called iTimed. The team used this toolkit to reverse-engineer key components of Apple hardware and demonstrated the vulnerability's potential impact.

Keeping it random

Scientists created a reliable true random number generator using atomically thin two-dimensional films, overcoming long-term stability issues and power consumption concerns. The innovation uses memristors to produce fluctuating electronic signals with an exceptionally high degree of randomness.

Apple AirPods Pro (2nd Generation, USB-C)

Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.

A backdoor in mobile phone encryption from the 90s still exists

A research team found that the GEA-1 algorithm, used in mobile phones since the 1990s, is easy to break and likely a deliberate weak encryption. The vulnerability no longer poses a significant threat to users, as most data traffic now uses more secure networks.

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.

What is the true cost to companies of IT security?

Researchers at the University of Göttingen are developing a method to assess IT security measures and their costs for businesses. The ProBITS project aims to evaluate the business process effects of IT security measures, taking into account operational impacts on employee productivity and flexibility.

Two new attacks break PDF certification

Researchers at Ruhr-Universität Bochum discovered two new attacks that break PDF certification signatures, enabling attackers to implant malicious code and insert fake content. The team tested 26 PDF applications, with 24 of them vulnerable to at least one attack.

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

Scientists will protect the "Smart City" from cyber threats

Researchers from Peter the Great St.Petersburg Polytechnic University developed a methodology for assessing cyber risks in Smart City infrastructure. The new approach analyzes asset types, threats, and risk values using a quantitative approach, demonstrating superiority over existing methods.

NYU Tandon announces 2021 S&K scholarship recipients

The NYU Tandon School of Engineering has awarded the 2021 S&K Scholarships to four outstanding NYU Cyber Fellows, including women and underrepresented group members. The scholarships will provide an additional $500 tuition scholarship towards each course for the entire Cyber Fellows program.

Cybersecurity researchers build a better 'canary trap'

A new artificial intelligence system, WE-FORGE, generates fake documents to protect intellectual property and make it difficult for adversaries to identify the real document. The system, designed at Dartmouth College, uses natural language processing to create believable and incorrect documents.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

A better kind of cybersecurity strategy

A new paper suggests that traditional deterrence strategies in cybersecurity can lead to escalation and counterproductive responses. The authors propose a more judicious approach involving selective retaliation based on improved detection and information gathering.

Securing the internet

Researchers studied AS interdependence, peering relationships, and cybersecurity threats. They found that organisations can't control their partners' choices, increasing the attack surface. However, some connections can reduce security threats by facilitating information sharing. Education and awareness are key to improving cybersecuri...

Security gap allows eavesdropping on mobile phone calls

Researchers at Ruhr-University Bochum discovered a security gap in the LTE mobile network, enabling eavesdropping on calls. The vulnerability affected 80% of radio cells across Germany, but has been fixed by manufacturers and mobile phone providers.

Aranet4 Home CO2 Monitor

Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.

Consumers don't fully trust smart home technologies

A survey by WMG, University of Warwick found that UK consumers are unconvinced about the privacy and security of smart home devices, with anxiety about potential breaches. The study suggests that businesses must address these concerns to increase consumer trust and adoption.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

ORNL, LANL-developed quantum technologies go the distance

Researchers successfully demonstrated the feasibility of quantum key distribution systems to enhance cybersecurity and extend range, ensuring compatibility across different vendors. This technology provides a secure solution for utilities without administrative headaches, simplifying operations.

We believe we're less likely than others are to fall for online scams

A new cybersecurity study found that people are more likely to fall for phishing scams because they underestimate their own risk and overestimate others', despite having access to base rate information. This self-enhancement bias can lead to a false sense of security and increase vulnerability to online attacks.

Critical 'starbleed' vulnerability in FPGA chips identified

A critical 'Starbleed' vulnerability in FPGA chips has been discovered, allowing attackers to gain complete control over the chips and their functionalities. The bug is integrated into the hardware and can only be removed by replacing the chips.

How secure are four and six-digit mobile phone PINs?

Researchers investigated how users choose their mobile phone PINs and found that six-digit PINs do not provide more security than four-digit ones. The study also showed that Apple's blacklist could be optimized and would make sense on Android devices.

AmScope B120C-5M Compound Microscope

AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.

Research center planned to help companies protect 'Internet of Things'

The University of Kansas is launching a center to improve IoT security, partnering with private firms to develop secure products and practices. The center aims to provide frameworks for companies to address IoT cybersecurity threats, with potential follow-on research on proprietary projects.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.

Study finds companies may be wise to share cybersecurity efforts

Researchers at North Carolina State University found that companies that disclose their cybersecurity risk management efforts fare better than those that don't after a breach. By implementing voluntary reporting guidelines, companies can reduce the impact of the 'contagion effect' and increase investor attractiveness.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

NSF renews grant for University of Arizona Cybersecurity Program

The University of Arizona's two-year AZSecure Cybersecurity Fellowship program will continue to train students in cybersecurity, covering tuition and fees, with a stipend of $34,000 per year. The renewal funding will help about 20 more students over the next five to seven years.

$3M grant to create cybersecurity modeled after human body

Researchers are developing a form of cybersecurity inspired by human biological systems, detecting and addressing threats in their earliest stages. The team is also offering training and research opportunities to students from underrepresented backgrounds.

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.

$4.6 million award creates program to train cybersecurity professionals

The University of Arkansas has received a $4.6 million award to train the next generation of cybersecurity professionals. The program will provide education and job training for students, focusing on critical industries such as transportation and energy, and addressing a national shortage of skilled cybersecurity experts.

Fluke 87V Industrial Digital Multimeter

Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.

UBC researchers find ways to hackproof smart meters

Researchers at UBC have developed a program to improve the security of smart meters and protect against software-interference attacks. The method addresses vulnerabilities that can be carried out by an attacker with low-cost equipment, found nine types of attacks within an hour through code-level analysis.

Army researchers identify new way to improve cybersecurity

Researchers at the US Army Research Laboratory identified a new strategy to improve cybersecurity by compressing network traffic without losing malicious activity detection capabilities. The technique stops transmitting data after a set number of messages, reducing bandwidth usage and increasing security alert reliability.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

How susceptible are hospital employees to phishing attacks?

A multicenter study by Brigham and Women's Hospital found that hospital employees are susceptible to phishing attacks, with a high click rate of 14.2%, but also showed improvement in response rates with increasing campaigns and phishing awareness training.

UTSA wins global cyber security challenge

The University of Texas at San Antonio has developed a framework using deep neural networks to classify and detect malware. This system was recognized as the top prize winner in the AICS 2019 Challenge sponsored by Crowdstrike Foundation and MIT Lincoln Laboratory, showcasing UTSA's expertise in cybersecurity.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

Army research takes proactive approach to defending computer systems

A team of researchers has developed a new proactive defense technique called moving target defense (MTD) to protect computer systems from cyberattacks. MTD involves changing the IP address of computers frequently enough to confuse attackers and make it harder for them to exploit vulnerabilities.