Bluesky Facebook Reddit Email

Delft scientists make first 'on demand' entanglement link

Researchers at QuTech in Delft successfully generated quantum entanglement between two quantum chips faster than it's lost, enabling the creation of a future quantum internet. The breakthrough allows for the connection of multiple quantum nodes and the establishment of the world's first quantum network.

New algorithm keeps data fresh in wireless networks

Researchers at MIT developed an algorithm to prioritize and transmit data from sensors in real-time, ensuring the freshest possible data is received by a network. The algorithm calculates an 'index' based on data age, channel reliability, and node priority, guaranteeing optimal decision-making without overloading wireless channels.

SAMSUNG T9 Portable SSD 2TB

SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.

An ionic black box

Researchers at UCSB are developing a chip that uses ionic memristor technology to create a physically unclonable device, rendering it vulnerable to cyber attacks. The technology aims to prevent cloning and hijacking of devices in networks, making them ideal for securing IoT devices.

A game changer: Metagenomic clustering powered by supercomputers

Researchers at Lawrence Berkeley National Laboratory developed HipMCL, an algorithm that can cluster large biological networks containing millions of nodes and edges. The new method allows biologists to make sense of big science data using massively parallel supercomputers.

What sort of stream networks do scientific ideas flow along?

Researchers analyzed scientific connections of leading scholars, including Harry Eugene Stanley and Edward Witten, to understand modern scientific cooperation. They used Erdos numbers to visualize the flow of ideas in graphs, revealing a self-organization resulting from power law dynamics in these networks.

Quantum internet goes hybrid

ICFO researchers have successfully connected two distinct quantum nodes using a single photon, demonstrating the feasibility of hybrid quantum networks. This breakthrough enables secure data transmission and advanced computing capabilities.

Apple iPhone 17 Pro

Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.

RIT team creates high-speed internet lane for emergency situations

Researchers developed a new protocol to improve information flow between emergency responders and decision-makers, reducing delays by seconds. The Multi Node Label Routing (MNLR) protocol helps detect failures and reroute data quickly, making it more reliable for emergency situations.

Does my algorithm work? There's no shortcut for community detection

A new paper in Science Advances challenges the approach of using metadata to validate community detection algorithms, showing that this method introduces biases and limits algorithm diversity. Researchers propose two new statistical approaches to explore deeper patterns within network data.

A friend of a friend is ... a dense network

A new theoretical model shows that dense networks evolve differently depending on the rate of second-neighbor connections. Networks with high copying probabilities exhibit densifying behavior, growing faster than themselves, and an unlimited number of growth transitions related to copying are discovered.

Where is my mind?

Researchers at Bar-Ilan University used network theory to map the human cortical network, revealing a hierarchical structure with different shells of low and high connectivity. The 'nucleus' shell, comprising 20% of nodes, supports global information integration and is linked to consciousness.

Technique reveals the basis for machine-learning systems' decisions

Researchers at MIT's CSAIL have developed a new way to train neural networks that provide not only predictions and classifications but also rationales for their decisions. The system consists of two modules: one extracts segments of text from training data and scores them, while the other performs prediction or classification tasks.

Fluke 87V Industrial Digital Multimeter

Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.

End to end 5G for super, superfast mobile

Researchers are exploring software-defined cellular networking to provide next-generation mobile broadband with speeds of up to 10 Gbits/s. The proposed end-to-end architecture offers flexibility, scalability, agility, and efficiency, while overcoming bandwidth shortages and improving quality of service.

Apple AirPods Pro (2nd Generation, USB-C)

Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.

Storage system for 'big data' dramatically speeds access to information

A new storage system, BlueDBM, uses a network of flash storage devices and field-programmable gate arrays to dramatically speed up the time it takes to access information. The system can analyze high-volume scientific data at around 30 frames per second, making it possible to answer user queries with very low latencies.

New approach to vertex connectivity could maximize networks' bandwidth

Researchers have developed a new technique for addressing vertex-connectivity problems, which could lead to communications protocols that coax as much bandwidth as possible from networks. The approach is based on decomposing the network into connected dominating sets, allowing for faster information flow and increased robustness.

Reliable communication, unreliable networks

Researchers developed a new framework to analyze ad hoc networks with fluctuating link quality, providing mathematical bounds on message propagation efficiency. The framework describes algorithms that can achieve maximal efficiency using randomness and adversarial relationships.

Keeping networks under control

Researchers at Northwestern University developed a computational framework to control large complex networks by identifying small perturbations that can rescue or reprogram them. The approach has been successfully applied to mitigate cascading failures in power-grid networks and identify potential drug targets in human cancer.

DJI Air 3 (RC-N2)

DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.

Virginia Tech engineers awarded $800,000 to improve radio spectrum usage

Researchers will explore novel solutions for efficient spectrum sharing and develop cooperative sharing methods for DoD and Navy's cognitive radio ad hoc networks. The projects aim to achieve transparent coexistence and improved network performance, enabling greater spectrum efficiency and capacity.

Guaranteed delivery -- in ad hoc networks

A new algorithm for message dissemination in decentralized networks is faster and deterministic, guaranteeing delivery to all nodes. The algorithm's efficiency relies on the collective action of nodes performing simple local tasks, emerging into a global behavior.

Frog calls inspire a new algorithm for wireless networks

Researchers at Polytechnic University of Catalonia developed an algorithm using Japanese tree frogs' calling behavior to solve the graph coloring problem, ensuring efficient color assignment in wireless networks. The new approach enables optimizing WiFi connections and improving energy efficiency.

Apple iPad Pro 11-inch (M4)

Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.

Skeleton key

Complex networks from different disciplines exhibit similar core structures, known as skeletons, which are shaped by basic growth mechanisms. This discovery could help predict how diseases or information spread across networks.

The elusive capacity of networks

Researchers at MIT demonstrate that network coding and error-correcting codes can be handled separately in wired networks, increasing capacity. In contrast, wireless networks pose challenges due to interference, but upper and lower bounds on capacities are calculated, providing a guide for future research.

Researchers boost efficiency of multi-hop wireless networks

A new data transmission approach developed by researchers at North Carolina State University can increase the amount of data transmitted in multi-hop wireless networks by 20-80%. The centrality-based power control algorithm optimizes system efficiency by determining when to use powerful transmissions and when to use less powerful ones.

CalDigit TS4 Thunderbolt 4 Dock

CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.

MIT control theory research: How to control complex networks

A new computational model analyzes any type of complex network, revealing critical points for controlling the entire system. Researchers found sparse networks require more nodes to control, while dense networks need fewer. The algorithm offers potential applications in reprogramming adult cells and identifying new drug targets.

Diamonds shine in quantum networks

Researchers at the University of Calgary have successfully created a node in a quantum network using impurities in diamonds. Impurities in diamonds can be used to store information encoded onto their quantum state, which can be controlled and read out using light.

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)

Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.

What's the semantic organization of human language?

Research reveals that dynamic semantic network of human language is small-world and scale-free but differs from syntactic network in hierarchical structure and node degree correlation. This discovery sheds light on the organization of human semantic knowledge and cognition.

Drinking water watched by Queensland's seventh sense

A network of 120 sensors is monitoring Lake Wivenhoe's environmental conditions in real-time, enabling early detection of contaminants and high rainfall events. The system uses CSIRO's FLECK smart wireless sensor technology to collect detailed data on water quality, event flows, and weather patterns.

Social networking for terrorists

A new analytical approach can reveal latent connections and patterns in terrorist networks, potentially helping investigators gather information on associates and bring perpetrators to justice sooner. The technique uses graph theory and computational data processing to analyze networks and identify critical nodes.

Network turns soldiers' helmets into sniper location system

Engineers at Vanderbilt University's Institute for Software Integrated Systems developed a system that combines information from multiple nodes to triangulate on shooter positions, improving accuracy. The system uses acoustic signals produced by high-powered rifles to track shooters in real-time.

Creality K1 Max 3D Printer

Creality K1 Max 3D Printer rapidly prototypes brackets, adapters, and fixtures for instruments and classroom demonstrations at large build volume.

IU informatics researchers throttle notion of search engine dominance

A recent study by IU informatics researchers challenged the notion of a Web-dominating 'Googlearchy' where search engines direct most traffic to established mainstream sites. The study found that popular sites receive significantly less traffic than predicted, indicating a more even distribution.

Nikon Monarch 5 8x42 Binoculars

Nikon Monarch 5 8x42 Binoculars deliver bright, sharp views for wildlife surveys, eclipse chases, and quick star-field scans at dark sites.

Good connections are everything

Scientists at Max Planck Institute discovered that activity patterns on scale-free networks have unusual dynamic properties, robust against random perturbations but sensitive to selective ones. These networks can store and retrieve fixed patterns, making them suitable for associative memories and pattern recognition.

Trees, vines and nets – microbial evolution changes its face

A new map of microbial evolution reveals that more than 600,000 genes have been transferred horizontally among species over billions of years. This finding challenges the traditional tree-like representation of evolutionary relationships and highlights the importance of horizontal gene transfer in shaping microbial communities.

Quantifying network vulnerability, and the best way to find hidden items

Scientists at the University of Thessaloniki, Bar-Ilan University, and Justus-Liebig-Universitat Giessen have quantified network vulnerability, finding that knowledge of top nodes can significantly reduce attack points. This research has implications for controlling contagious disease spread through social networks.

New cyber security protocol for online banking, and more

A new cybersecurity protocol called 'delayed password disclosure' aims to prevent identity authentication attacks on online banks and ad hoc wireless networks. By using this protocol, users can verify their identities without divulging sensitive information, making it difficult for attackers to steal funds or sensitive data.

Davis Instruments Vantage Pro2 Weather Station

Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.

Magnetic resonance imaging deconstructs brain's complex network

Researchers used MRI to study brain activity and found that tens of thousands of discrete brain regions form a network with the same features as other complex networks, such as the Internet. The brain network shares two fundamental properties: small world connectivity and in-homogeneity, allowing for efficient information transmission.

CompSci expert Wetzel spots weaknesses in Wi-Fi security

Researchers identified vulnerabilities in Wi-Fi networks that can drain battery life and disrupt communication infrastructure. A proposed solution involves reputation-based control systems to strengthen routing protocols against stealth attacks.

Structural cues make 'six degrees' phenomenon work

A Cornell University computer scientist has concluded that the key to finding people in a network lies in its structure, which can provide fundamental cues for navigation. By using an "inverse square" pattern of connections, messages can travel faster and more efficiently through networks.

Celestron NexStar 8SE Computerized Telescope

Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.