A researcher at MSU developed an algorithm to improve information security tools by reducing the complexity of scalar multiplication in elliptical curve transformations. The new algorithm achieves a 5% reduction in precomputation stage complexity and a 4% reduction in main stage complexity.
DJI Air 3 (RC-N2)
DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.
A new practical Quantum Random Number Generator (QRNG) has been developed, enabling secure communication and overcoming weaknesses of current encryption. This game-changing technology will revolutionize internet security, making attacks based on predicting 'random' events a thing of the past.
The article highlights predatory monetization schemes in video games, such as loot boxes, that can encourage repeated spending and blur the line between gaming and online gambling. These schemes have been linked to Internet gaming disorder and pose significant financial risks to vulnerable players.
Researchers at the University of Konstanz are analyzing denial-of-service attacks to understand their influence on politics and international attention. The study aims to map global patterns of cyberattacks, evaluate their relationship with traditional forms of contention, and identify consequences for protest dynamics.
Researchers analyzed over 5 terabytes of internet-scale data to provide a unique 24-hour view of cyberattacks in Florida and the U.S., revealing top infected states, cities, and industries. The 'FloridaSOAR' program aims to detect compromises, remediate privacy issues, and provide resiliency to critical infrastructure.
Researchers at QuTech in Delft successfully generated quantum entanglement between two quantum chips faster than it's lost, enabling the creation of a future quantum internet. The breakthrough allows for the connection of multiple quantum nodes and the establishment of the world's first quantum network.
Apple Watch Series 11 (GPS, 46mm)
Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.
The study finds that both state and non-state actors face similar decisions when it comes to claiming credit for cyberattacks, but their strategies diverge due to different optics. The researchers highlight the importance of understanding how attackers' motives and identity can be revealed through credit claims.
The new transmitter uses ultrafast 'frequency hopping' and data encryption to protect signals from being intercepted and jammed. This technology could secure medical devices, wearables, vehicles, and smart household technologies, making the internet of things a more secure place.
A new analysis of US internet search data found a strong association between anti-Muslim and pro-ISIS searches in ethnically alike communities with high poverty levels. The study suggests that counterterrorism policies targeting Muslims may inadvertently increase radicalization in these communities.
A new study from the University of Surrey has developed AI-powered technology to monitor the wellbeing of people with dementia. This innovative system uses IoT devices installed in homes to detect potential health issues early on, preventing hospital admissions and improving care outcomes.
Sky-Watcher EQ6-R Pro Equatorial Mount
Sky-Watcher EQ6-R Pro Equatorial Mount provides precise tracking capacity for deep-sky imaging rigs during long astrophotography sessions.
Researchers at UTSA created an authorization framework for connected cars to prevent cyber attacks and unauthorized access to sensors and data. The framework provides a conceptual overview of various access control decision and enforcement points needed for dynamic interaction in smart car ecosystems.
A new study by Cedars-Sinai investigators found that online physician satisfaction scores tend to be skewed and can mislead patients. The study examined data from Healthgrades and found that ratings consistently skewed positively and had different distributions across specialties.
Researchers at St. Poelten University of Applied Sciences developed an ultrasound-firewall app that detects and blocks acoustic cookies, allowing users to control their device's audio data transmission. The project aims to provide a new standard for secure ultrasonic communication and protect user privacy.
A multidisciplinary team at KU is tackling the fundamental science underpinning IoT security, focusing on solutions to side-channel attacks and securing information in the cloud. The team aims to improve resilience and trust between computers, essential for addressing growing cybersecurity concerns.
Researchers demonstrated that two common email encryption standards are vulnerable to attacks, compromising secure communication. The S/MIME standard is not suitable for secure communication due to outdated cryptography, while OpenPGP can be configured securely but often isn't.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
A large-scale international study found that 57% of kids' apps collect and share personal data with third parties without parental consent. Many apps, including popular ones like Disney's 'Where's My Water?' and Gameloft's 'Minion Rush', may be infringing US Children's Online Privacy Protection Act (COPPA) rules.
A study from Cass Business School reveals that Western Internet Firms (WIFs) fail in China due to cultural and competitive differences. CIFs' use of ancient Chinese military strategies and tactics gave them an advantage in competition, while WIFs' limited understanding of the local market hindered their success.
Researchers investigate how algorithms create personalized content and 'filter bubbles' that can foster biases and inequality. The MyBubble project aims to provide transparency into online advertising and profiling.
A new study found that commercial online advertising can engage large numbers of pregnant smokers earlier in their pregnancies, with an overall uptake rate of 3.4% among those who clicked on adverts. The ads were more effective than free-of-charge adverts on health websites and yielded a high user engagement rate.
Apple MacBook Pro 14-inch (M4 Pro)
Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.
The Chat Analysis Triage Tool (CATT) uses algorithms to examine word usage and conversation patterns by suspects, identifying language-based differences that can indicate a risk assessment. The tool has the potential to prevent child sexual assault by allowing law enforcement to prioritize cases and respond quickly.
A study of a billion Twitter posts found that users with darker skin tones modified emojis more often to express their identity, while users with light skin were less likely to make changes. The results also showed that darker skin tones were underrepresented globally, but still widely used.
A novel algorithm has been proposed to simulate the color appearance of objects under chromatic illuminants, addressing the fundamental question of human color perception. The algorithm successfully simulated differences in color appearance for #theDress image, which sparked debate over its colors online.
AmScope B120C-5M Compound Microscope
AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.
A new study reveals that millions of Americans are searching for and purchasing illicit marijuana online, with the majority of search results linking to mail-order retailers. The study found that marijuana shopping searches nearly tripled in the US between 2005 and 2017, peaking at over 2 million searches per month.
Researchers investigated how people curate their social image on the web using game theory. They found that people are willing to pay to filter out unfavorable information from their online profiles.
A study by the American College of Cardiology found a strong correlation between geographic and seasonal trends in coronary heart disease hospitalizations and internet search queries. The research suggests that search data can be a useful resource for tracking heart disease over time and in different regions.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
A study of over half a million Americans reveals that perceptions of aging shift as people get older, with younger adults viewing older age as negative and older adults feeling younger, while ideal retirement ages vary by age group.
Researchers found that nearly two-thirds of low-income participants had never visited a farmers market, highlighting a need for increased awareness. A novel internet-based social marketing strategy, Healthy Roots for You, was tested to increase awareness and encourage future use among low-income residents.
Researchers analyzed over 540,000 tweets to find nearly 80% of them were duplicates or re-tweets originating from bot accounts. The study found that right-wing internet activists used social bots to spread nationalistic content and boosted Abe's election campaign.
Aranet4 Home CO2 Monitor
Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.
A Worcester Polytechnic Institute researcher seeks to reinvent residential network security by developing cloud-based security providers. The system will direct traffic over a secure pathway to a controller and virtual computers, verifying site profiles and catching nefarious sites attempting to access homes.
MIT researchers have developed a new chip that consumes only 1/400 as much power as software execution of public-key encryption protocols, executing 500 times faster. The chip uses a general-purpose elliptic-curve design and features a dedicated inverter circuit to increase energy efficiency and reduce surface area.
Researchers at Stanford University have developed a wake-up receiver that uses ultrasonic signals to turn on devices, extending battery life. The technology has potential applications in designing the next generation of networked devices, including 'smart' devices that can communicate directly with each other without human intervention.
A new prototype has been developed to monitor environmental variables in buildings, utilizing open-source platforms and the Internet of Things. The system aims to optimize building energy consumption and improve indoor air quality by detecting CO2 levels and optimizing ventilation.
A report suggests national parks adopt smart technologies, such as real-time environmental monitoring and sensor systems, to improve visitor experiences and conserve resources. The Smart Parks model demonstrates how high connectivity can benefit all stakeholders, from nature conservationists to park authorities and emergency services.
Celestron NexStar 8SE Computerized Telescope
Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.
Frequent internet users see themselves as 'free agents' and are less likely to choose a religious tradition. Internet use encourages 'tinkering' with religious ideas, leading to a broader array of beliefs.
A recent study by IMDEA Networks explores the potential of Software-Defined Networking (SDN) to make the Internet more scalable, manageable, and adaptable. The HyperAdapt project proposes mechanisms and techniques to deal with network dynamism, improve ISP performance, and support novel technologies like D2D and mmWaves.
DEV Tecnologia's product, DEV FieldConnect, connects machinery and equipment to the internet, enabling online performance monitoring. The device has been successfully tested in a chemical-solvent-recycling machine and is expected to be well-received by the market, especially in Brazil.
Apple AirPods Pro (2nd Generation, USB-C)
Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.
Researchers from UC3M and CSIC have developed a system to analyze electromagnetic emissions from smartphones for security vulnerabilities. The study focuses on lateral movement attacks, where attackers try to exploit the energy emitted by devices to breach encryption.
Researchers at UTA and UVM have developed a novel group-delay-managed nonlinear-optical medium, enabling simultaneous all-optical regeneration of multiple WDM channels by a single device. This breakthrough could lead to cheaper and more energy-efficient high-speed internet communications.
A recent study found that digital assistants on smartphones are less effective than laptop-based Google searches in providing quality sexual health advice. The researchers tested Siri and Google Assistant with 50 questions and compared their answers to laptop-based Google searches, finding that Google performed better in most cases.
Kestrel 3000 Pocket Weather Meter
Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.
Researchers developed a simple tool to detect website data breaches by monitoring email account activity. The study found that 19 websites, including a well-known startup with millions of active customers, were hacked during the 18-month testing period.
A BU researcher has been awarded a three-year grant to study the effectiveness of SHUTi, an internet-based cognitive behavioral therapy program, in reducing health disparities among black women with insomnia. The study aims to adapt SHUTi for black women and compare its effectiveness with standard care.
A study published in the Journal of Consumer Psychology found that consumers are more likely to engage in dishonest behavior, such as shoplifting or piracy, if they perceive a company as harming the environment or people. This effect occurs even when consumers have not personally had a bad experience with the company.
Davis Instruments Vantage Pro2 Weather Station
Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.
A new project at Lancaster University aims to discover the likely privacy and security challenges arising from children using IoT devices. Researchers will work closely with child protection experts to provide guidelines and advice for children, their families, and teachers on programming IoT devices.
Research reveals that online products sold as selective androgen receptor modulators (SARMs) may contain unapproved substances or incorrect amounts. Most products did not match label information, highlighting the need for greater regulatory oversight of these appearance- and performance-enhancing drugs.
Researchers have developed a high-speed quantum encryption system that can transmit encryption codes five to 10 times faster than existing methods, potentially securing the future of the internet. The system uses photons of light and advanced detectors to encode and decode keys, making it secure from common attacks even with imperfect ...
Researchers found that a 'one size fits all' approach to technology use outside working hours is not suitable for every employee. Instead, they recommend employers give individuals control over their working patterns and actively involve them in decisions about technology use.
A team of UCLA engineers is developing an Internet of Things (IoT) system tailored to the challenges of the battlefield, enabled by data-driven decision making and secure platforms. The system aims to increase mission success and reduce casualties in rapidly changing situations.
Fluke 87V Industrial Digital Multimeter
Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.
Researchers have long used preprints to accelerate scientific discovery. A forgotten biology preprint experiment from the 1960s has been unearthed, revealing a long history of resistance to open knowledge sharing among publishers and learned societies.
Researchers developed compact deep-learning AI software that can run on mobile computer chips, allowing devices to operate independently of the internet. This technology has enormous potential for various fields, including industrial robots, drones, and manufacturing plants.
Researchers found over 3,000 online e-cigarette vendors in 2014, offering cheap prices and health claims that may attract youth. The study highlights the need for effective age verification, payment restrictions, and regulation to prevent minors from accessing e-cigarettes.
A clinical trial found that online computerized cognitive behavioral therapy (CCBT) was more effective than usual care for primary care patients with depression or anxiety. Adding an internet support group provided no additional benefit over CCBT alone, but improved mood and anxiety symptoms compared to usual care.
The NSF Secure and Trustworthy Cyberspace program aims to address the growing cybersecurity challenge through foundational research and education. The $74.5 million investment will support a wide range of research areas, including access control, cryptography, and human interaction, to develop safer and more secure cyber systems.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
A Canadian study created a website tailored for men transitioning to parenthood, addressing their specific information needs. The site provides resources on parenting, relationships, work-life balance, stress management, and sleep improvement.
A new study reveals combosquatting domains are 100 times more prevalent than typosquatting domains, and nearly 60% of abusive domains remain active for over a year. Researchers discovered legitimate companies registering trademark-containing domains that were later taken over by malicious attackers.
Researchers found that 25% of web APIs pose high security and privacy risks, which can be blocked without breaking websites. Blocking these features reduces the amount of code a website accesses, making it safer for users.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
Researchers at University College London have developed a new receiver technology that provides consistently high-speed broadband connectivity. The technology enables dedicated data rates of over 10,000 megabits-per-second (Mb/s) for low-cost broadband connections to every UK home.
A new study explores the coevolving web of life as a network, revealing counterintuitive results on direct and indirect effects within large webs of interacting species. The findings suggest that strong coevolutionary selection between partners increases the importance of indirect effects on overall evolution.
Researchers analyzed survey data on automobile purchases between 2002 and 2012 to compare time spent on internet sources with time spent on offline sources. The study found that those who searched more online tend to spend more time at dealerships, while consumers older than 50 spend less time searching and are less likely to be satisf...
A team of UMass Amherst computer scientists are part of a four-institution consortium awarded $4.5 million by the Army Research Labs to develop predictive battlefield analytics and services. The project aims to create a seamless network between humans and technology to give soldiers a competitive edge in future military operations.
A Brown University study finds that political polarization has increased most among demographic groups with low internet and social media use. The authors suggest that broader forces beyond the digital landscape may be driving the rise in partisanship.
Nikon Monarch 5 8x42 Binoculars
Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.