Bluesky Facebook Reddit Email

Students often do not question online information

A study by Johannes Gutenberg University Mainz found that students have difficulty evaluating online sources, with most relying on irrelevant information. Critical online reasoning skills are essential for learning in the 21st century, yet few training approaches exist to foster these skills.

Cybersecurity, tech infrastructure requires international trust

Researchers highlight the importance of trust in fostering international cooperation in cybersecurity and tech infrastructure. Incident response teams from the US and Europe collaborate with Russian counterparts to prevent sabotage and maintain grid security.

Towards an unhackable quantum internet

Harvard and MIT researchers have developed a prototype quantum node that can correct for signal loss, paving the way for a practical quantum internet. The breakthrough enables secure communication over long distances using entangled particles, making it impossible for eavesdroppers to intercept messages.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

ACM publishes new journal on the Internet of Things

The ACM Transactions on Internet of Things (TIOT) journal chronicles the transformative development of the IoT. The journal covers a broad range of topics, including low-power wireless networking, embedded systems, data analytics, and security, with a strong emphasis on experimental validation.

Researchers identify novel cybersecurity approach to protect Army systems

A team of researchers has identified a novel cybersecurity approach called SymTCP to enhance the effectiveness and timeliness of protection against attacks on Army systems. The approach uses symbolic execution to explore the state of TCP implementation and identify ways to reach critical points in the code.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

We can make predictions about relationships - but is this necessary?

German and Canadian psychologists have developed a predictive model for relationship longevity, identifying key features that indicate a successful or unsuccessful partnership. Couples who start with similar needs and maintain individual independence tend to stay together longest, while those with differing happiness levels are more li...

Rice boosts 'internet of things' security -- again

Rice University engineers have introduced a technique to make security for the 'internet of things' more than 14,000 times better than current state-of-the-art defenses. The new strategy leverages power regulators to obfuscate information leaked by encryption circuits.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

Feds back Rice computer scientist's security strategy

Ang Chen, a Rice University assistant professor, has been awarded a $550,000 NSF CAREER Award to develop a new security strategy for future networks. His proposal, Poise, aims to make security an equally important goal as connectivity in the next-generation internet.

Plugging into a 6G future with users at the center

Researchers are exploring a human-centric approach for 6G communications, emphasizing the need for secure, affordable, and accessible networks that protect users' mental and physical health. The technology will also require innovative solutions such as decentralized blockchain networks and artificial intelligence to enhance performance.

Predictive touch response mechanism is a step toward a tactile internet

A team of researchers has developed a method to forecast proper feedback in human-to-machine applications, enhancing the Tactile Internet experience. The proposed module uses an artificial neural network to predict the material touched, achieving a prediction accuracy of 97% with four materials.

AmScope B120C-5M Compound Microscope

AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.

Cybercrime: Internet erodes teenage impulse controls

A new study by Flinders University finds that teenagers' online impulsivity is a significant risk factor for cybercrime. The internet's blurring of social boundaries encourages thrill-seeking behavior, which can lead to digital piracy, pornography, and hacking. The researchers suggest that policy interventions should take into account ...

US is polarizing faster than other democracies, study finds

A new study by Brown University researchers finds that US political polarization has grown rapidly over the past 40 years, surpassing other developed democracies. The research suggests that factors such as racial division, party sorting, and partisan cable news may be driving this trend.

Internet use reduces study skills in university students

Research at Swansea University and the University of Milan found that students with high levels of internet addiction are less motivated to engage in studies, more anxious about tests, and experience increased loneliness. This excessive internet use impairs study skills and motivation.

The Internet of Things by satellite will become increasingly accessible

Researchers have developed algorithms that limit control information without affecting network performance, enabling IoT via satellite to become more efficient and accessible. This is crucial for applications like smart farming and home automation, where wireless communication between machines is essential.

Sky & Telescope Pocket Sky Atlas, 2nd Edition

Sky & Telescope Pocket Sky Atlas, 2nd Edition is a durable star atlas for planning sessions, identifying targets, and teaching celestial navigation.

'TransMap' will ensure reliable and efficient transportation networks

Researchers at the University of Arkansas are developing a new data-driven map, TransMap, with $1.5 million funding from the US Department of Transportation. The system will utilize the Internet of Things to provide real-time, interactive maps and geospatial data for transportation infrastructure planning.

Apple Watch Series 11 (GPS, 46mm)

Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.

UCLouvain strengthens connectivity of 1 in 8 of world's smartphones

UCLouvain's research developed Multipath TCP to support expanding global internet traffic, improving Wi-Fi and mobile network switching. The protocol is used by 800 million iPhones and has won international awards, enhancing connectivity in rural areas and offering a win-win for subscribers and telecom operators.

Design flaw could open Bluetooth devices to hacking

New research from Ohio State University finds a fundamental flaw in Bluetooth Low Energy devices' communication with mobile apps, leaving them vulnerable to fingerprinting attacks and unauthorized access. The study identified over 5,800 Bluetooth devices, with 94.6% of them able to be 'fingerprinted' and 7.4% vulnerable to hacking.

Rigol DP832 Triple-Output Bench Power Supply

Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.

Free Internet access should be a basic human right -- study

A new study argues that free internet access is essential for protecting fundamental human rights, particularly in developing countries. The research highlights the importance of universal access to enable billions of people to lead 'minimally decent lives'.

Fluke 87V Industrial Digital Multimeter

Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.

UTSA study warns of security gaps in smart light bulbs

A new study by UTSA researchers reveals that popular smart light brands have significant security holes, including infrared capabilities that can be exploited by hackers. The study warns that smart bulbs could become a prime target for hackers, posing a risk to consumers' personal information.

Artificial intelligence system gives fashion advice

A University of Texas at Austin team developed an AI system named Fashion++ that analyzes outfits and suggests tweaks for a more fashionable look. The tool uses visual recognition systems to consider color, pattern, texture, and shape, offering alternative outfits to users.

Escapism: A powerful predictor of internet gaming disorder among video gamers

A recent study found that both professional esports players and recreational video game players are at risk of developing internet gaming disorder when they use gaming as a means of escapism. The study, which surveyed over 4,300 gamers, suggests that escapist tendencies can be a common predictor of gaming disorder in both groups.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

Dictators' love-hate relationship with digital communication technology

A new book examines how autocratic regimes use digital technology to suppress and control information, while also identifying opportunities for protest movements to mobilize online. Researchers found that higher internet penetration can reduce protest occurrence, but online channels can spread mobilization quickly once established.

Swimming toward an 'internet of health'?

The authors propose an 'internet of health' where wearable sensors provide non-intrusive data on a person's health, correlated with environmental factors. This could lead to early disease prevention and personalized medicine.

How cities can leverage citizen data while protecting privacy

MIT researchers analyzed 380,000 government service requests to find a way for cities to preserve citizen privacy while improving efficiency. They identified model cities that maximized both privacy and efficiency, suggesting similar methodologies for worldwide evaluation of government services.

Decoding how kids get into hacking

Researchers found that predictors of juvenile delinquency, such as low self-control, are common factors for both boys and girls. For girls, peer associations played a significant role in hacking behavior, while for boys, time spent playing video games was associated with hacking. The study highlights the importance of parents understan...

Celestron NexStar 8SE Computerized Telescope

Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.

Predictable esports: Amateurs and professionals sit differently in a chair

A team of scientists from Skoltech and Moscow Institute of Physics and Technology studied the movements of 19 esports players, including professionals and amateurs. The results show that machine learning methods can accurately predict a player's skill level in 77% of cases, with professional players moving more than beginners.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

Internet can be valuable tool for people with undiagnosed rare disorders

Researchers found that self-diagnosis using the internet can lead to successful diagnoses of rare inherited conditions like autosomal dominant tubulointerstitial kidney disease (ADTKD). The study received over 665 referrals from 1996 to 2017, with positive genetic testing results in 27% of cases.

Why companies should not give their customers discounts after service failures

A new study published in the Journal of Marketing found that price-based recovery incentives after service failures are negatively associated with the likelihood of subscribers renewing their contracts at the end of the contract period. The researchers propose several ways subscription-based service providers can reduce the negative ef...

The origin and future of spam and other online intrusions

A new paper by Emilio Ferrara explores the complex history of digital spam, from its origins in confidence tricks to sophisticated AI-powered manipulations. With social media bots and deepfakes posing significant threats, experts warn of an escalating 'arms race' against spammers.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.

Internet communities can teach amateurs to build personalized governments

A study on Minecraft communities reveals that amateur gamers develop essential leadership and governance skills, creating effective self-governance systems. The research demonstrates the transferability of these skills to real-world environments, highlighting the potential for internet communities to shape healthier democracy.

Secure data protection in the new internet of things

The DoRIoT project aims to enable statutory regulations and industry standards on data security, reliability, and privacy in the Internet of Things. By developing self-organizing migration of services, companies can operate independently of cloud infrastructure and reduce traffic and reaction time.

Study: Internet perpetuates job market inequality

Researchers found that access to online job opportunities has not led to greater equality in the hiring process. Instead, lower-wage jobs are highly competitive, while higher-wage positions have limited openings.

Keeping children safe in the 'Internet of Things' age

Lancaster University scientists have drawn up new guidelines to help designers build in safeguards for children using programmable Internet computing devices. The research aims to mitigate risks such as peer-to-peer abuse, bullying, and exploitation of data generated by children.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

Research reveals how the Internet may be changing the brain

Research reveals that excessive Internet use can lead to changes in brain structure and function, impacting cognitive processes like attention and memory. The study also highlights the need for balance between online activities and social interactions, emphasizing the importance of 'Internet hygiene' techniques.

Networking with ghosts in the machine... and speaking kettles

The research team conducted 'talking head' interviews with household objects, including a smart kettle, to understand our relationship with networked technologies. The experiment aims to uncover new ways of thinking and create practical tools for making sense of the IoT.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

Vulnerability of cloud service hardware uncovered

Researchers at Karlsruhe Institute of Technology (KIT) discovered a vulnerability in field-programmable gate arrays (FPGAs) used in cloud services, allowing hackers to carry out side-channel attacks and spy on other users. The finding highlights the need for protection measures to safeguard against cyber threats.

USC researchers imagine a cheaper, fairer marketplace for digital goods

USC researchers Bhaskar Krishnamachari and Aditya Asgaonkar propose a blockchain-based solution to reduce costs and increase efficiency in online transactions. Their system allows buyers and sellers to interact directly without third-party mediators, using smart contracts to verify honesty and disincentivize malicious behavior.

Sky-Watcher EQ6-R Pro Equatorial Mount

Sky-Watcher EQ6-R Pro Equatorial Mount provides precise tracking capacity for deep-sky imaging rigs during long astrophotography sessions.

Research sheds light on UK's new unsustainable viewing habits

A new study reveals that UK viewers are increasingly opting for data-intensive streaming services, leading to a significant increase in household data demand. The research found that YouTube was the most data-demanding watching service, while smartphones were the most commonly owned devices.