Bluesky Facebook Reddit Email

Life Sciences

Comprehensive exploration of living organisms, biological systems, and life processes across all scales from molecules to ecosystems. Encompasses cutting-edge research in biology, genetics, molecular biology, ecology, biochemistry, microbiology, botany, zoology, evolutionary biology, genomics, and biotechnology. Investigates cellular mechanisms, organism development, genetic inheritance, biodiversity conservation, metabolic processes, protein synthesis, DNA sequencing, CRISPR gene editing, stem cell research, and the fundamental principles governing all forms of life on Earth.

447,757 articles | 2542 topics

Health and Medicine

Comprehensive medical research, clinical studies, and healthcare sciences focused on disease prevention, diagnosis, and treatment. Encompasses clinical medicine, public health, pharmacology, epidemiology, medical specialties, disease mechanisms, therapeutic interventions, healthcare innovation, precision medicine, telemedicine, medical devices, drug development, clinical trials, patient care, mental health, nutrition science, health policy, and the application of medical science to improve human health, wellbeing, and quality of life across diverse populations.

431,843 articles | 751 topics

Social Sciences

Comprehensive investigation of human society, behavior, relationships, and social structures through systematic research and analysis. Encompasses psychology, sociology, anthropology, economics, political science, linguistics, education, demography, communications, and social research methodologies. Examines human cognition, social interactions, cultural phenomena, economic systems, political institutions, language and communication, educational processes, population dynamics, and the complex social, cultural, economic, and political forces shaping human societies, communities, and civilizations throughout history and across the contemporary world.

260,756 articles | 745 topics

Physical Sciences

Fundamental study of the non-living natural world, matter, energy, and physical phenomena governing the universe. Encompasses physics, chemistry, earth sciences, atmospheric sciences, oceanography, materials science, and the investigation of physical laws, chemical reactions, geological processes, climate systems, and planetary dynamics. Explores everything from subatomic particles and quantum mechanics to planetary systems and cosmic phenomena, including energy transformations, molecular interactions, elemental properties, weather patterns, tectonic activity, and the fundamental forces and principles underlying the physical nature of reality.

257,913 articles | 1552 topics

Applied Sciences and Engineering

Practical application of scientific knowledge and engineering principles to solve real-world problems and develop innovative technologies. Encompasses all engineering disciplines, technology development, computer science, artificial intelligence, environmental sciences, agriculture, materials applications, energy systems, and industrial innovation. Bridges theoretical research with tangible solutions for infrastructure, manufacturing, computing, communications, transportation, construction, sustainable development, and emerging technologies that advance human capabilities, improve quality of life, and address societal challenges through scientific innovation and technological progress.

225,386 articles | 998 topics

Scientific Community

Study of the practice, culture, infrastructure, and social dimensions of science itself. Addresses how science is conducted, organized, communicated, and integrated into society. Encompasses research funding mechanisms, scientific publishing systems, peer review processes, academic ethics, science policy, research institutions, scientific collaboration networks, science education, career development, research programs, scientific methods, science communication, and the sociology of scientific discovery. Examines the human, institutional, and cultural aspects of scientific enterprise, knowledge production, and the translation of research into societal benefit.

193,043 articles | 157 topics

Space Sciences

Comprehensive study of the universe beyond Earth, encompassing celestial objects, cosmic phenomena, and space exploration. Includes astronomy, astrophysics, planetary science, cosmology, space physics, astrobiology, and space technology. Investigates stars, galaxies, planets, moons, asteroids, comets, black holes, nebulae, exoplanets, dark matter, dark energy, cosmic microwave background, stellar evolution, planetary formation, space weather, solar system dynamics, the search for extraterrestrial life, and humanity's efforts to explore, understand, and unlock the mysteries of the cosmos through observation, theory, and space missions.

29,662 articles | 175 topics

Research Methods

Comprehensive examination of tools, techniques, methodologies, and approaches used across scientific disciplines to conduct research, collect data, and analyze results. Encompasses experimental procedures, analytical methods, measurement techniques, instrumentation, imaging technologies, spectroscopic methods, laboratory protocols, observational studies, statistical analysis, computational methods, data visualization, quality control, and methodological innovations. Addresses the practical techniques and theoretical frameworks enabling scientists to investigate phenomena, test hypotheses, gather evidence, ensure reproducibility, and generate reliable knowledge through systematic, rigorous investigation across all areas of scientific inquiry.

21,889 articles | 139 topics

Mathematics

Study of abstract structures, patterns, quantities, relationships, and logical reasoning through pure and applied mathematical disciplines. Encompasses algebra, calculus, geometry, topology, number theory, analysis, discrete mathematics, mathematical logic, set theory, probability, statistics, and computational mathematics. Investigates mathematical structures, theorems, proofs, algorithms, functions, equations, and the rigorous logical frameworks underlying quantitative reasoning. Provides the foundational language and tools for all scientific fields, enabling precise description of natural phenomena, modeling of complex systems, and the development of technologies across physics, engineering, computer science, economics, and all quantitative sciences.

3,023 articles | 113 topics

Breakthrough in cryptography could result in more secure computing

Researchers at the University of Bristol have made a significant breakthrough in cryptography, developing a new protocol that enables fast and secure Multi-Party Computation. This allows for complex computations on secret data without revealing inputs, with potential applications in finance, pharmaceuticals, and other industries.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Scholarship program to train students in cybersecurity

The National Science Foundation awards a $2.3 million scholarship program at Kansas State University to train students in cybersecurity, as the nation faces growing cyber threats. The program aims to develop experts capable of handling cybersecurity challenges and safeguard critical infrastructure.

Fluke 87V Industrial Digital Multimeter

Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.

Internal relations

Researchers at Kansas State University are working on developing a flexible but standardized and secure communication network for medical devices. The team aims to enable devices to monitor and reason about patient health, reducing security problems as devices become more complex.

New cybersecurity tool suite demonstrated this week

The Idaho National Laboratory has demonstrated a suite of cybersecurity tools that provides situational awareness of networks and control systems. The Sophia software tool passively observes network communications, providing real-time and historical records of those communications.

Aranet4 Home CO2 Monitor

Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.

What's in a name?

The US Department of Homeland Security's DNSSEC project authenticates data existence, ownership, and integrity, protecting against hackers' threats. By deploying DNSSEC in key zones, DHS builds a safer cyberspace with complete end-to-end chain protection.

Cyber workshop at Sandia Labs seeks potential responses to cyberattacks

Sandia National Laboratories is launching a Cyber Engineering Research Institute to coordinate with industry and universities, aiming to increase cybersecurity research. Experts discuss the need for shared threat information and innovative solutions, including prize competitions to stimulate radical security innovations.

RUB researchers break W3C standard

Researchers from Ruhr-University Bochum found a serious attack against XML Encryption, which is used by companies like IBM and Microsoft to protect data. The attack exploits a weakness in the CBC mode for chaining ciphertext blocks, rendering XML Encryption insecure.

Sky & Telescope Pocket Sky Atlas, 2nd Edition

Sky & Telescope Pocket Sky Atlas, 2nd Edition is a durable star atlas for planning sessions, identifying targets, and teaching celestial navigation.

NSF grant funds cybersecurity education at Stevens

The NSF grant will enhance existing cybersecurity curricula and expand the laboratory for hands-on instruction. The initiative aims to address a growing need for 10,000-30,000 cybersecurity professionals in the US.

US needs new national strategy for era of cyber aggression, new paper concludes

A new research paper concludes that deterrence can no longer be the primary national cybersecurity strategy due to the unique characteristics of cyberspace. Experts propose a three-tiered approach to guide US strategy in responding to cyber threats, emphasizing war-fighting and offense-defense frameworks to contain damage and reduce harm.

AmScope B120C-5M Compound Microscope

AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.

Hiding the honeypots

Researchers reveal that honeypot traps are susceptible to detection by advanced Botnet malware, allowing attackers to disable or ignore them. This vulnerability highlights the need for secure honeypot deployment and research into covert honeypot building techniques.

New computer security guide can help safeguard your small business

The NIST Small Business Information Security: The Fundamentals guide provides 10 necessary steps for small business security, including installing firewalls and backing up business data. By following these steps, small businesses can reduce their vulnerability to cyber threats and protect sensitive information.

Denial of service denial

A new passive protocol called IPACF blocks threats to gatekeeping computers and Authentication Servers, allowing legitimate users access private resources. The filter takes just 6 nanoseconds to reject non-legitimate information packets associated with DoS attacks.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Mathematical advances strengthen IT security

A new approach based on mathematical theory of elliptic curves has emerged as a leading candidate for more efficient cryptography. Elliptic curve cryptography provides the same level of security as 1024-bit keys for RSA with smaller key sizes, making it computationally more efficient.

Stevens receives National Science Foundation grant for cybersecurity scholars

Stevens Institute of Technology has been awarded a $850,672 National Science Foundation grant to support students pursuing degree programs in cybersecurity. The scholarship program will provide 11 two-year scholarships covering tuition and a stipend, requiring students to work for the government for at least two years after graduation.

Garmin GPSMAP 67i with inReach

Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.

New intrusion tolerance software fortifies server security

The Self Cleansing Intrusion Tolerance (SCIT) technology developed by George Mason University researchers limits the damage caused by unknown cyber-attacks by restricting exposure time. By periodically cleansing servers, SCIT reduces the risk of data theft and provides an additional layer of defense against intrusions.

Dartmouth launches network security study

A team of Dartmouth researchers is launching the Dartmouth Internet Security Testbed (DIST) to examine live network activity and develop methods for detecting malicious activity. The project will provide valuable insights into securing wireless networks, improving network security technology and practices for all internet users.

Stevens honors cybersecurity experts at Convocation 2006

Susanne Wetzel and Rebecca Wright are recognized for their work on a new undergraduate degree program in cybersecurity at Stevens Institute of Technology. The program is designed to provide students with security expertise within a broad education, preparing them for careers in information assurance and computer security.

Wetzel and Wright awarded grant for cybersecurity lab

The new lab will provide practical training in security and information assurance, preparing students to meet the challenges in protecting the nation's information infrastructure. The lab will increase the number of IT professionals educated and trained in theoretical and practical aspects of information assurance and security.

GoPro HERO13 Black

GoPro HERO13 Black records stabilized 5.3K video for instrument deployments, field notes, and outreach, even in harsh weather and underwater conditions.

UC Berkeley to lead $19 million NSF center on cybersecurity research

The Team for Research in Ubiquitous Secure Technology (TRUST) center aims to develop new technologies to design, build, and operate trustworthy information systems. The researchers will focus on developing secure embedded systems, integrating trusted components, and creating information management software tools.

NSF launches computer security center

The TRUST consortium, funded by NSF's Science and Technology Centers program, aims to create new technologies that make computer software and networks inherently secure. Researchers will focus on protecting against attacks, ensuring data integrity, and developing tools for building trustworthy systems.

XML-based language formats checklists for IT security

The XCCDF specification document provides a flexible, vendor-neutral format for measuring conformance to security benchmarks and generating records of benchmark tests. NIST is developing computer security checklists for widely used government agencies with the help of organizations like NSA and DHS.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

Federal standard issued for improving IT security

The new standard provides detailed guidance on categorizing systems and assessing potential impact of security breaches. It will help agencies make informed decisions and implement cost-effective security measures, complemented by a companion standard specifying minimum federal system requirements.