Researchers developed a new firewall program that monitors for malicious code in Android cellphones and prevents hardware-generated data leaks. The software uses machine learning algorithms to identify anomalies in internal communications and prevent attacks.
The project will establish a digital 'Online Cyber Security System' decision support service to rapidly bring together information on system vulnerabilities and alert organisations that may be affected. The system aims to address the acute shortage of cyber security experts by providing an up-to-date threat assessment and decision supp...
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
A UTA-led interdisciplinary team is developing a computer program to detect social bots spreading fake news on Twitter. The project will leverage sophisticated algorithms and data mining techniques to combat the bots and spread of misinformation.
Researchers from Case Western Reserve University proposed a new method to calculate and correct short-circuit errors in large-scale distribution systems. The method, which was published in IEEE/CAA Journal of Automatica Sinica, uses real-time simulations and modeling to optimize the system in just 74 milliseconds.
The Sensor Suitcase is a portable case that contains sensors and equipment to identify energy-saving opportunities in small commercial buildings. It helps users find cost-effective measures to save about 10% on their energy bills, making it easier for building owners to make their facilities more energy efficient.
Apple Watch Series 11 (GPS, 46mm)
Apple Watch Series 11 (GPS, 46mm) tracks health metrics and safety alerts during long observing sessions, fieldwork, and remote expeditions.
The PervasiveSUB project allows deaf-blind people to access TV broadcasts in real-time, directly through Braille lines. This innovation has been successfully tested with groups of deaf-blind users in Spain and the US, who praised its ability to transmit information without intermediaries.
VoCo enables users to edit audio tracks by typing a transcript, automatically synthesizing new words in the speaker's voice. The system uses an optimization algorithm to find and stitch together phonemes, producing natural-sounding results.
Researchers at North Carolina State University have developed a user-friendly, inexpensive device called CAPTIVE that allows users to manipulate 3D virtual objects in six degrees of freedom. With minimal latency and cost, CAPTIVE offers a significant improvement over existing technologies.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
A new method has been developed to ensure reproducibility in computational experiments, addressing a major challenge in science. Nextflow, a workflow management system, provides a standardized framework for managing computational workflows and integrating resources such as data repositories and cloud computing.
Lenvio Inc. has exclusively licensed Hyperion, a malware behavior detection technology from Oak Ridge National Laboratory (ORNL), to quickly identify malicious software behavior. This technology improves upon traditional signature detection methods, providing a new class of cyber protection against large-scale cybersecurity threats.
Researchers found that both humans and smartphones frequently fail to distinguish face morph photos from genuine faces, posing a security risk for identity verification. This weakness can be exploited by fraudsters, but raising awareness and using new technologies may help overcome these issues.
A recent research project aims to develop biocomputers that can overcome current computing obstacles, such as high energy consumption and processing speed limitations. The new approach uses biomolecular motors to solve problems by moving through a nanofabricated network of channels.
Researchers are working to detect malware in implanted medical devices, which can pose risks to patients. UA engineer Roman Lysecky is pioneering technologies to enable IMDs to detect malware and continue functioning properly despite security breaches.
Meta Quest 3 512GB
Meta Quest 3 512GB enables immersive mission planning, terrain rehearsal, and interactive STEM demos with high-resolution mixed-reality experiences.
A recent study found that automated journalism lacks the context and complexity of traditional reporting, citing issues with programming news angles in advance. However, journalists believe robo-journalism can reduce costs and increase specificity in some reporting areas.
Researchers at George Mason University are developing a tool combining intelligent computer software and crowdsourcing to help intelligence analysts make informed decisions. The IARPA-funded Co-Arg project aims to provide cognitive assistants that can test hypotheses, evaluate evidence, and provide intelligent reasoning in high-stakes ...
Researchers have developed Vizier, an open-source software to 'clean' big data, making it easier for users to explore, visualize, and communicate insights. The tool is designed for massive datasets, allowing users to spot errors and offer solutions.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
A new chip designed by MIT researchers has the potential to make voice control ubiquitous in electronics, offering significant power savings. The chip's ability to minimize memory bandwidth and compress weights associated with each node enables efficient speech recognition, making it practical for relatively simple electronic devices.
Researchers from Boston University School of Medicine developed a new software tool to measure energy production in human immune cells, using Extracellular Flux technology and the SHORE analytical tool. This tool enables accurate comparisons between healthy individuals and those with type 1 or type 2 diabetes.
Researchers at TUM develop new simulation software that combines flow mechanics and flight dynamics in real-time, allowing pilots to prepare for challenging situations like flying near ships or mountains. The program has been validated with reference models and will be tested with experienced pilots.
The University of Houston has received a $66 million in-kind software grant from Siemens PLM Software to support its Industrial Design program. This grant provides students with access to advanced technology used by global companies, enhancing their training and employability.
Apple iPad Pro 11-inch (M4)
Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.
Researchers are preparing to tackle an onslaught of petabytes of complex data from sophisticated experiments, including CERN's Large Hadron Collider. To keep up with the challenge, experts propose developing exascale supercomputers and smarter networks, as well as reengineering software to adapt to future hardware developments.
Brown University's XROMM technology has been upgraded with new software and fluoromicrometry methods, allowing researchers to track muscle contractions and bone movements with precision. This advancement has led to discoveries such as the use of body muscles to power swimming in fish.
GFlow is a computational software that makes wildlife habitat connectivity modeling vastly faster, more efficient and superior in quality and scope. It can solve ecological problems spanning large landscapes and predict the spread of diseases like Zika.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
Using swarms of sensor-equipped biobots and remote-control technology, researchers create detailed maps of unfamiliar environments. The mapping process involves releasing the biobots into a defined area, which are then stitched together to form a comprehensive map, useful for locating survivors after a disaster.
Shuffler, a new program, continuously scrambles code to prevent hackers from exploiting bugs and carrying out malicious activities. The technique is faster and more user-friendly than existing solutions, making it a promising defense against cyber attacks.
A University at Buffalo research team explores the limitations of banning autonomous weapons, arguing that the actual problem lies in societal forces driving their development. They emphasize the need to examine cultural techniques and ideologies that lead to technological advancements.
The ECP has selected four co-design center proposals, focusing on co-optimizing applications, data services, and exascale platforms. The Block-Structured AMR Co-Design Center aims to develop a new framework for solving complex PDEs on exascale architectures.
Researchers at Binghamton University are using a National Science Foundation grant to study the potential of hardware in detecting malware. By modifying a computer's central processing unit (CPU) chip, the team aims to improve malware detection and provide continuous protection without requiring significant software investment.
Kestrel 3000 Pocket Weather Meter
Kestrel 3000 Pocket Weather Meter measures wind, temperature, and humidity in real time for site assessments, aviation checks, and safety briefings.
The 'Digital Life' initiative aims to preserve the digital heritage of all life on Earth by creating 3D models of living organisms. Using the Beastcam Array, a rapid-capture system, scientists have already created models of sharks, scorpions, and other animals.
Researchers from Binghamton University have found a vulnerability in the Haswell CPU component that allows hackers to gain control of individual, company, and government computers. The team identified a weak point in address space layout randomization (ASLR) software that can be exploited by manipulating a CPU's branch predictor.
Researchers at Carnegie Mellon University have developed a new technology called ViBand that enables smartwatches to detect finger taps, flicks, and scratches. This allows for new applications using common gestures to control the smartwatch and other objects connected through the internet of things.
Uru, a software startup founded by Cornell Tech graduates, uses computer-vision technology to automatically find blank surfaces in videos and display non-disruptive ads. The company has received several awards and is targeting major platforms like Instagram and YouTube to monetize user-generated content.
Celestron NexStar 8SE Computerized Telescope
Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.
The new motor uses a precisely machined hollow iron ball to move in any direction using electronic controls, reducing mechanical failures and maintenance. SIMbot can maintain its balance while moving at speeds of up to 1.9 meters per second, making it capable of navigating through doorways and furniture.
The conference will showcase the latest developments and studies on augmented and virtual reality, enabling trainees to learn on-the-job skills and enhancing the workplace of the future. Researchers will present prototypes, including a product from Virtalis that allows interactive discussion and modification of 3D constructions.
Researchers at Brigham Young University found that software developers often interrupt users with security messages at inconvenient times, leading to a significant decrease in user engagement. The study suggests that displaying security warnings when users are not multitasking can substantially increase their security behavior.
Davis Instruments Vantage Pro2 Weather Station
Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.
A powerful materials discovery platform developed at Harvard University has been licensed to Kyulux, a developer of OLED display technologies. The platform enables the rapid identification of promising molecules for use in next-generation electronic displays.
Bernd Bickel's algorithm improves technical modelling of planar-rod structures for optimal stability and efficiency in manufacturing. The software has applications in art, wire sculptures, and rapid prototyping.
A team of researchers from Google and NYU Tandon School of Engineering analyzed commercial pay-per-install practices and their distribution of unwanted software. They found that PPI affiliates are directly catering to the unwanted software market, avoiding user protections while delivering unwanted software under a thin veil of consent.
Nikon Monarch 5 8x42 Binoculars
Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.
The National Science Foundation is establishing two Scientific Software Innovation Institutes (S2I2) with $35 million in funding over five years. The institutes will focus on developing and maintaining scientific software, improving the nation's cyberinfrastructure, and expanding access to computational resources for researchers. The i...
A new web-based software program helps reduce ADHD behavioral symptoms in children by coordinating care and ensuring patients get effective ADHD medications. This improvement leads to better treatment outcomes, with children treated by pediatricians using the technology experiencing significantly less ADHD symptoms than those without it.
A new study by Binghamton University researchers suggests that organizations should consider the human side of IT errors, including mood and personality traits. The study found that developers are less likely to report self-committed errors when in a positive mood, highlighting the importance of fostering an environment where employees...
Fluke 87V Industrial Digital Multimeter
Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.
Researchers aim to improve energy efficiency in software applications by increasing understanding of their impact on power usage. The three-year project will develop novel automatic analyses and tools to support decision-making, with the goal of enabling software engineers to create more energy-efficient code.
The new compiler system allows users to program industrial knitting machines with simple shapes and translate them into needle-level instructions. This enables the creation of a variety of 3D knitted shapes, previously difficult to produce due to complex machine control.
Researchers are developing a crowdsourced system that allows users to contribute in helping detect and locate unauthorized radio frequency use. The system uses software-defined radio technology and smartphone apps to monitor for suspicious activity, potentially aiding authorities in combating wireless theft.
Sky & Telescope Pocket Sky Atlas, 2nd Edition
Sky & Telescope Pocket Sky Atlas, 2nd Edition is a durable star atlas for planning sessions, identifying targets, and teaching celestial navigation.
A study by Brain State Technologies found that young athletes with long-term concussion symptoms showed significant improvements after using HIRREM neurotechnology. The athletes experienced durable changes in heart rate variability, suggesting enhanced capacity for rapid adaptive adjustments in their pumping function.
Computer scientists at Duke University have developed software that allows users to specify what others can see on camera, preventing inadvertent disclosure of sensitive information. The researchers presented a system that enables users to select the part of a scene they want to share, either by hand or with a few clicks.
A computer program can now accurately retrieve product images based on hand-drawn sketches, revolutionizing online shopping. This technology enables users to sketch their desired products and instantly find them online.
Researchers from Disney Research and Fudan University developed a new approach that enables computers to recognize events in videos, including categories of events they've never seen before. The software associates visual elements with each type of event and can learn from new examples to improve its accuracy.
The researchers designed arrays of hair-like structures with resolutions as low as 50 microns, printing coarse bristles to fine fur onto flat and curved surfaces. They demonstrated the technology's capabilities by creating Velcro-like bristle pads, sensing systems, and actuation devices.
Aranet4 Home CO2 Monitor
Aranet4 Home CO2 Monitor tracks ventilation quality in labs, classrooms, and conference rooms with long battery life and clear e-ink readouts.
The FBI must develop 21st-century investigative skills to access encrypted data without compromising security. The organization should invest in a technical investigation center with agents familiar with modern telecommunications and computer science.
A Johns Hopkins team discovered three ways to send rogue commands to interfere with an airborne hobby drone's operation, causing it to land or crash. The finding highlights the vulnerability of drones to hackers, which is crucial for tasks like aerial deliveries and photography.
A new software, WebGazer.js, uses integrated webcams to infer where users look on a webpage. This allows for more accurate web analytics than traditional methods, which often require expensive eye-tracking devices. The software can be added to any website with a few lines of code and provides insights into user behavior.
Researchers have developed a software called ForcePhone that allows smartphones to detect force or pressure on their screens or bodies, enabling users to command devices with gestures. The technology uses the phone's microphone and speaker to translate vibrations into commands, offering a natural interface beyond basic touch interfaces.
The Software Assurance Marketplace (SWAMP) partnership between Morgridge Institute for Research and Bowie State University integrates cybersecurity into undergraduate coding courses. This integration helps students develop prolific programming skills, including reading and interpreting code for errors. The program aims to address the h...
AmScope B120C-5M Compound Microscope
AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.
Concordia University researchers found that common security programs lower browser security and introduce vulnerabilities, posing a risk to online computing. They advise users to keep their browser and operating system up-to-date and consider alternative parental control apps.
Researchers from over 30 universities compared quantum simulation codes, achieving more precise results than previous calculations. The study defines a quality criterion to verify future software developments and contributes to higher standards for materials property simulations.
A €2.4 million project aims to make embedded software safe, customizable, and open source by developing new tools and making existing ones transparent. The project, led by Holger Hermanns at Saarland University, focuses on power management software for mobile devices like smartphones and e-bikes.
Garmin GPSMAP 67i with inReach
Garmin GPSMAP 67i with inReach provides rugged GNSS navigation, satellite messaging, and SOS for backcountry geology and climate field teams.
A new development tool is being proposed based on the concept of 'software quality information needs'. The tool aims to provide developers with the right kind of information about the current state of and the effect of changes on software quality. Three case studies will be conducted to develop metrics and measurement techniques to det...
Researchers at Bielefeld University have developed an open source software solution to process raw data from ultra-high resolution fluorescence microscopy. This technology allows for the attainment of higher resolutions than physical limits, enabling the study of dynamic processes in living cells.
The MEGA7 edition features significant upgrades to speed up data-crunching time and handle larger DNA datasets. This allows researchers to analyze more complex genetic information, driving global evolutionary discoveries.