Bluesky Facebook Reddit Email

Seeing the software world from a dependency perspective

Researchers propose novel protocol structure model to analyze and verify service-oriented systems, incorporating dependencies for synchronous, asynchronous, and broadcast communications. The model combines features of partial orders and Petri nets to tackle complex software development challenges.

Checking out open access

A Concordia librarian advocates for open source technology to make academic journals freely available, reducing subscription fees. The initiative aims to ensure institutional support for long-term sustainability and promotes the mission of libraries to support scholarly research.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

Grammar undercuts security of long computer passwords

Researchers developed a grammar-aware password cracker that can bypass security with 10% of dataset cracked exclusively by the team's algorithm. The study highlights the importance of using different parts of speech in passwords, as pronouns are far fewer in number than other words.

Computer scientists find vulnerabilities in Cisco VoIP phones

Researchers Ang Cui and Salvatore Stolfo found critical security breaches in Cisco VoIP phone technology, allowing hackers to eavesdrop on private conversations globally. They developed a new defense technology called Software Symbiotes to protect embedded systems from malicious code injection attacks.

Smartphones might soon develop emotional intelligence

Researchers at the University of Rochester developed a computer program that analyzes 12 features of speech to identify six emotions from sound recordings, achieving 81% accuracy. The system can be used to develop complex apps that adjust colors and music based on user emotions.

CalDigit TS4 Thunderbolt 4 Dock

CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.

An operating system in the cloud

TransOS enables seamless interaction with files and applications from anywhere in the world, eliminating hardware and software dependencies. The researchers aim to extend TransOS beyond personal computers to other devices, including mobile phones and appliances.

Digital tabletop system with views on demand

A new digital tabletop system, PiVOT, allows users to view shared content while each individual receives a personalized view, with multiple views possible at the same location without interfering with others. The system supports various applications and has been implemented with a sample prototype evaluated for its effectiveness.

Home-based assessment tool for dementia screening

A home-based computer software, ClockMe System, allows adults to screen themselves for early signs of dementia. The system scores the participant's clock-drawing test and records the duration and timing of the test, providing valuable insight into thought processes.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

Computers get a better way to detect threats

Researchers at the University of Texas at Dallas have developed a technique called 'space travel' that allows one computer in a virtual network to monitor another for intrusions and malware. This technology bridges the gap between hardware and software systems, enabling more efficient threat detection.

Who's the most influential in a social graph?

A new algorithm developed by Georgia Tech can identify influencers as information changes within a network, making it more efficient than existing algorithms. The software can process streaming graphs up to 100 times faster and has wide-ranging applications in advertising, transportation, and other fields.

Computer viruses could take a lesson from showy peacocks

Researchers created digital organisms in Avida to study mate attraction, finding that even costless displays evolved as indicators of genetic quality. This challenges traditional theories on ornamental displays serving as signals for virility.

Frankenstein programmers at UT Dallas test a cybersecurity monster

Researchers at UT Dallas have developed a new software system, dubbed Frankenstein, that can evade traditional antivirus scanning mechanisms. This innovative technology takes code from existing programs and repurposes it to create malicious software, providing a 'cloak of invisibility' for attackers.

Celestron NexStar 8SE Computerized Telescope

Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.

Researchers hope to transform software engineering training

A study will assess software engineering students' teamwork skills using objective and quantitative measures, developing software models that predict team success. The research aims to provide advice to teachers and industry leaders on managing teams, emphasizing the importance of 'soft skills',

Apple AirPods Pro (2nd Generation, USB-C)

Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.

Adding a '3D print' button to animation software

A group of computer graphics experts led by Harvard researcher Moritz Bächer create a software tool that translates video game characters into fully articulated action figures using 3D printing. The tool optimizes joint placement, size, and location for physical constraints, producing robust and realistic printed figures.

More gold -- and other minerals -- in them thar hills?

A new method developed by Tel Aviv University's Prof. Lev Eppelbaum successfully uncovered a previously unknown polymetallic reserve in the Caucasus mountainside, containing over 500,000 tons of copper, zinc, lead, aluminium, and gold-silver mixtures.

Researchers develop new method for analyzing cell function

BioImageXD is an open-source software that enables the analysis of cell and tissue functions by rendering microscopic images into three-dimensional models. The software allows scientists to study how molecules move on cell surfaces, bond together, and analyze cancer cells' behavior.

Meta Quest 3 512GB

Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.

Concordia's 3-D innovation revolutionizes visual art

Researchers at Concordia University have developed 3D drawing tools for a software system called Sandde, which allows artists to work intuitively by drawing in thin air. The project aims to bring new dimensionality to visual art, facilitating the free movement of artists as they add 3D layers to their work.

Researchers take virus-tracking software worldwide

Researchers have restructured their virus-tracking software to allow for modular development and integration with other applications. The new implementation enables public health scientists to update maps on the evolution and spread of pathogens, facilitating better deployment of resources to protect citizens and forces in the field.

AmScope B120C-5M Compound Microscope

AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.

Tablet-based case conferences improve resident learning

A new study shows that tablet-based conference mirroring enhances radiology residents' learning experience by allowing them to manipulate images, zoom in on subtle abnormalities, and participate remotely. More than 75% of residents who participated in this format strongly agreed that it improved their learning.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

Katrina changed everything

A new flood simulation tool, combined with the Dams Sector Analysis Tool, enables rapid visualization and training for emergency responders. The software can model catastrophic flooding in under 24 minutes, improving disaster management and preparedness.

First the smart phone, now the smart home

A smart home uses sensors and software to anticipate household needs, improving health and energy efficiency. Washington State University's Diane Cook envisions a future where homes can monitor elderly residents' activities and alert caregivers.

To combat identity theft, protect computer

A Michigan State University study found that computer users with triple-threat protective software are 50% less likely to have their credit card information stolen. Computer-related deviance, such as downloading pirated content, increases the risk of identity theft.

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.

New technology to aid crystallization prediction

Visual HABIT software helps predict crystal properties in different chemical environments, reducing early-stage laboratory research and development costs. The technology enables companies to adopt a 'bottom-up' approach to product design in pharmaceutical, agrochemical, and fuel sectors.

EPSRC awards 3 ICT program grants to UCL Engineering

The EPSRC has awarded £18 million to three ICT projects at UCL Engineering, focusing on optical communication technologies, wireless technology, and adaptive software engineering. The projects aim to develop new generation of optical fibers, unlock more bandwidth, and improve software development efficiency.

Aranet4 Home CO2 Monitor

Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.

Computer software monitoring detects ICD malfunctions sooner

A new software program can detect ICD problems earlier than traditional monitoring methods, potentially saving thousands of patients from health risks. The automated system analyzed large databases of ICD patients and found issues with recalled leads at least a year before recalls were issued.

Cryptographic attack highlights the importance of bug-free software

A new attack was discovered that can bypass security provided by OpenSSL, a widely used cryptography toolkit. The attack targets a specific version of the software and requires a specific set of options to work, but highlights the need for formal verification and correctness in open source software.

Web security start-up receives $1.1 million

StopTheHacker, a UC Riverside graduate-led start-up, has received $1.1 million in funding to launch sales and marketing of its web site security product that uses artificial intelligence algorithms to detect malware. The company aims to help small and medium-sized businesses protect themselves against hacker attacks.

Apple MacBook Pro 14-inch (M4 Pro)

Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.

Revealed in accurate detail, the underground world of plants

Researchers at the University of Nottingham have developed a revolutionary technique using X-ray Micro Computed Tomography (Micro-CT) to analyze plant roots with unprecedented accuracy. This breakthrough enables the identification of root architecture in three dimensions, paving the way for improved crop breeding and food security.

Computer sleuthing helps unravel RNA's role in cellular function

A new computational method has been developed to analyze RNA motifs, revealing new structural patterns that can help understand the role of RNA in cellular function. This breakthrough may lead to new treatments for certain diseases, according to researchers at the University of Central Florida.

A study analyzes emotions in software engineering

A study by Universidad Carlos III de Madrid's Computer Science Department investigates emotions' importance in software engineering, focusing on requirements engineering. The researchers applied a social psychology tool, the affect grid, to discover that emotions impact requirements development and user experience.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

WSU chemist applies Google software to webs of the molecular world

Aurora Clark adapts Google's PageRank algorithm to create moleculaRnetworks, enabling researchers to determine molecular shapes and chemical reactions without the need for lab experiments. This technology focuses on hydrogen bonds in water and has applications in drug design, disease research, and environmental analysis.

A mobile device for preventing and treating drug use

A mobile device called iHeal combines sensors to detect physiological changes and software applications to intervene in real-time. The device aims to prevent drug use by identifying trigger points for risky health behaviors.

Sky & Telescope Pocket Sky Atlas, 2nd Edition

Sky & Telescope Pocket Sky Atlas, 2nd Edition is a durable star atlas for planning sessions, identifying targets, and teaching celestial navigation.

KIT: Fast and easy programming

The ALMA project aims to simplify software development for embedded multi-core processors, reducing development time and costs. The new tool chain uses open-source Scilab software and focuses on close co-design of software and hardware.

From opening thunder to closing whimper

The Urban Blast Tool uses pre-calculated pressure loads to predict damage patterns in surrounding areas, enabling first responders to prioritize their activities. The tool can calculate the initial blast loads in fine detail and store those results for later use.

Built to withstand almost anything

The Department of Homeland Security's Science and Technology Directorate has published a series of guides to help buildings withstand extreme hazards, such as earthquakes, hurricanes, and terrorism. These resources provide architects, engineers, and building owners with the tools needed to design critical infrastructure that can absorb...

A big leap toward lowering the power consumption of microprocessors

Computer scientists at the University of Texas at Austin have created a detailed analysis of application power, performance, and energy on various hardware. The results show that different software types have varying levels of power usage, making optimization for energy efficiency crucial. This study has significant implications for co...

Sony Alpha a7 IV (Body Only)

Sony Alpha a7 IV (Body Only) delivers reliable low-light performance and rugged build for astrophotography, lab documentation, and field expeditions.

Slippery when stacked: NIST theorists quantify the friction of graphene

Researchers at NIST developed a new software to quantify the friction of graphene, finding that the material becomes more slippery when stacked. The study provides new quantitative data and sheds light on the differences in graphene's friction compared to three-dimensional graphite-like materials.