A global study reveals that multiple environmental stressors threaten the world's rivers, affecting human water security and biodiversity. The research team integrated maps of 23 stressors to provide a single index, highlighting areas with high incident threat levels.
Dr. Susanne Wetzel's NSF-funded research aims to develop protocols for secure, private, and fair collaboration without trusted third-party intervention. The project seeks to resolve the issue of policy reconciliation, allowing parties to collaborate while preserving their privacy.
Apple iPhone 17 Pro
Apple iPhone 17 Pro delivers top performance and advanced cameras for field documentation, data collection, and secure research communications.
The project aims to design a fundamentally secure internet architecture by exploring radical departures from the modern internet. The team will develop new technologies, including receiver-invoked third-party functionalities, on-demand bandwidth, and secure global private networks.
The eXpressive Internet Architecture (XIA) Project aims to develop a next-generation network architecture that fixes security and reliability deficiencies threatening the Internet's viability. XIA will include intrinsic security features, enabling users to ensure the legitimacy of websites and documents they access.
Research by Professor Aaron Kupchik finds that schools are safer than ever, yet disciplinary practices continue to be overly aggressive and ineffective. He recommends alternatives such as removing police from schools and involving students in the rule-making process to promote safety and well-being.
Public health researchers at Tufts University describe cutting-edge methods for addressing obstacles in disease surveillance, enabling earlier detection and improved preparedness. The new tools facilitate the analysis of vast data streams from various sources, including satellite images and social media.
Research shows that hospitals adopting automated surveillance technologies are more likely to implement evidence-based infection control practices, reducing MRSA, ventilator-associated pneumonia, and surgical care infections.
Davis Instruments Vantage Pro2 Weather Station
Davis Instruments Vantage Pro2 Weather Station offers research-grade local weather data for networked stations, campuses, and community observatories.
A recent study analyzing academic websites across the US found that many are using outdated and insecure Flash applications, leaving them susceptible to hacking. The researchers used a tool provided by Hewlett Packard to scan 250 educational sites, revealing low-level security vulnerabilities in over 20% of cases.
A new study found that active surveillance is a suitable treatment option for patients with low-risk prostate cancer, resulting in lower mortality rates compared to radical prostatectomy or radiation therapy. After a median follow-up of 8.2 years, the surveillance group had a higher percentage of deaths from competing causes.
A team of researchers led by Dr. Bhavani Thuraisingham has developed a framework and incentives to enhance assured information sharing in cloud computing. The initiative, funded by AFOSR's Multidisciplinary University Research Initiative, aims to provide a secure environment for processing large amounts of data.
Global health diplomacy is gaining traction in foreign policy circles, with the WHO Foreign Policy and Global Health Initiative aiming to integrate health into international agendas. Experts emphasize the importance of diplomatic engagement for addressing global health challenges and advancing national security objectives.
SAMSUNG T9 Portable SSD 2TB
SAMSUNG T9 Portable SSD 2TB transfers large imagery and model outputs quickly between field laptops, lab workstations, and secure archives.
A new study by Michigan State University researchers finds that zero tolerance policies in schools are failing to make students feel safe. The policies, established in the mid-1990s, have become plagued by inconsistent enforcement and inadequate security.
A study by David Victor finds that fossil-fuel subsidies undermine energy security and worsen the environment. Most subsidies are a waste of money, and their removal could provide $550 billion annually for more beneficial programs.
A new research paper concludes that deterrence can no longer be the primary national cybersecurity strategy due to the unique characteristics of cyberspace. Experts propose a three-tiered approach to guide US strategy in responding to cyber threats, emphasizing war-fighting and offense-defense frameworks to contain damage and reduce harm.
Anupam Datta leads Carnegie Mellon's contribution to SHARPS, a collaborative project tackling EHR and HIE security concerns. The team aims to develop policies and technologies for secure healthcare systems, leveraging expertise in information security and privacy.
A new study from UC Berkeley concludes that younger Americans are getting the better deal when factoring in public education as an intergenerational entitlement program. The researchers found that people born between 1972 and 2060 will make net gains of 4 to 6 percent over their lifetimes, while those now aged 63 to 80 have paid out mo...
GQ GMC-500Plus Geiger Counter
GQ GMC-500Plus Geiger Counter logs beta, gamma, and X-ray levels for environmental monitoring, training labs, and safety demonstrations.
A new study suggests that older Americans delaying retirement will continue and accelerate, alleviating pressure on Social Security and Medicare. The trend is driven by increased education, longer life expectancy, and more women in the workforce, leading to a shift in work patterns.
The US Department of Health and Human Services has awarded $15 million to the University of Illinois at Urbana-Champaign's Information Trust Institute to improve patient outcomes while limiting access to electronic health records, health information exchange, and telemedicine. The project aims to address security and privacy barriers i...
Professor Terry August, a Rady School of Management faculty member, has received a prestigious CAREER award from the National Science Foundation for his research on software security. The $530,000 award will support his project to analyze the relationship between government policy, economic incentives and software security.
Researchers are developing a standard policy language to achieve flexible and dynamic Web security when sharing information with different agencies, countries, and organizations. This technology aims to facilitate the exchange of information between entities using different languages to express their security constraints.
Fluke 87V Industrial Digital Multimeter
Fluke 87V Industrial Digital Multimeter is a trusted meter for precise measurements during instrument integration, repairs, and field diagnostics.
The EU's Framework Programmes have been a driving force in ICT Trust and Security research, with six ongoing FP6-IST projects submitting their papers to the Journal of Computer Security. The projects aim to convert know-how into economic advantages, while advancing security, privacy, and trust in new technologies.
UC researchers argue that citizen awareness and participation are essential for a robust cybersecurity strategy. They recommend a three-pronged approach: coordination between government agencies and business interests, engagement with the public about their role in cybersecurity, and education on safe computer practices.
Dartmouth researchers have received a five-year $18.8 million grant from the US Department of Energy to develop cyber security tools for the power grid. The 'Smarter Grid' project aims to integrate information technologies with real-time authentication, integrity, and confidentiality.
A fragmented system with inadequate data leads to ineffective foodborne illness surveillance in Canada. The lack of a national program results in reliance on surveys, making it difficult to execute meaningful interventions.
CalDigit TS4 Thunderbolt 4 Dock
CalDigit TS4 Thunderbolt 4 Dock simplifies serious desks with 18 ports for high-speed storage, monitors, and instruments across Mac and PC setups.
The special issue examines the role of intelligence within government, organisational structures, and coordination. It presents a fascinating analysis of historical and contemporary security and intelligence, highlighting the need for co-ordination and 'joined up' approaches.
A new policy paper questions the economic, environmental and logistical basis for billions of dollars in federal subsidies and protectionist tariffs for domestic ethanol producers. The report highlights the environmental threats posed by current biofuels policy and challenges claims that ethanol use lowers greenhouse gas emissions.
The researchers are developing high-level policy languages and verification techniques to ensure secure information flow in complex systems. Their tools provide graphical visualizations of information flow behavior, allowing designers and auditors to quickly understand a system's security protocols. The goal is to enable rapid informat...
A RAND study examines five directions for NATO to take: refocusing on Europe, the greater Middle East, fragile states, nonstate threats, or a global alliance of liberal democracies. The alliance may need to combine various roles to stay relevant and avoid overextending itself.
A new game called Immune Attack teaches 7th-12th graders about immune system proteins and cells. The game shows significant gains in confidence and knowledge among players, according to an FAS expert. The game is designed to inspire high school computer programming classes to create their own games.
Apple MacBook Pro 14-inch (M4 Pro)
Apple MacBook Pro 14-inch (M4 Pro) powers local ML workloads, large datasets, and multi-display analysis for field and lab teams.
The GAZEL study found that older workers' perceived health improves significantly after retirement, especially in those with ideal working conditions. This suggests that improving working conditions is crucial to retaining older workers in the workforce.
A two-year grant will explore advanced information security risks in complex systems, combining computer science and technology management. The project aims to develop an innovative interdisciplinary framework to optimize system information security and productivity.
A new publication by ESRC explores how to strike a balance between security and privacy in the face of increasing technological advancements. The guide is designed to help organizations assess potential concerns and identify safeguards, emphasizing the need for early consideration and informed decision-making.
The University of Miami has been awarded $1.7 million by the Department of Energy to research carbon sequestration, a method that stores CO2 in geological reservoirs to combat global warming. The team will use state-of-the-art geophysical and geochemical techniques to monitor the reservoirs and ensure safe storage.
A new study by University of Illinois finance professors reveals that unexpected inheritances significantly increase the likelihood of early retirement. Nearly a quarter of workers who received a surprise inheritance retired early compared to 18% of total workers surveyed.
Apple iPad Pro 11-inch (M4)
Apple iPad Pro 11-inch (M4) runs demanding GIS, imaging, and annotation workflows on the go for surveys, briefings, and lab notebooks.
The Trustworthy Information Systems for Healthcare project aims to improve the security and effectiveness of information technology infrastructure in healthcare settings. Researchers will address fundamental challenges in information security, such as protecting clinical information while ensuring clinician access.
The American Academy of Arts and Sciences has released three white papers on US space policy, urging a fundamental reformulation based on Cold War-era mindsets. Experts emphasize the need for a new approach that prioritizes collaboration and equitable utilization of space for common benefit.
Researchers at Carnegie Mellon University have found that an individual's date and state of birth are sufficient to guess their nine-digit Social Security number with great accuracy. The study also highlights the risks of identity theft, which cost Americans almost $50 billion in 2007 alone.
Celestron NexStar 8SE Computerized Telescope
Celestron NexStar 8SE Computerized Telescope combines portable Schmidt-Cassegrain optics with GoTo pointing for outreach nights and field campaigns.
The conference highlighted the critical role of shipping in the global economy, with Rear Admiral Richard Gurnon emphasizing that paying ransoms to pirates is doomed to fail. The event also explored innovative technologies to protect cargo ships and discuss how maritime security affects U.S. economic security.
A recent study found that increased immigration-related law enforcement since 2001 unfavorably affected the labor market for low-education, male immigrants from Latin America. Their wages, employment, and hours worked fell relative to similar groups.
The article examines how the Columbine High School shootings were originally portrayed in the media and how those messages changed after 9/11. The author argues that framing the event as 'terrorism' contributed to a broader discourse of fear, legitimating the war on terror and expanding social control.
A new University of Minnesota study reveals that ethanol production in the Midwest uses far less water than similar processes in drier states like California and South Dakota. Iowa's 6 gallons of water per gallon of ethanol is significantly lower than California's 2,100 gallons.
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C)
Anker Laptop Power Bank 25,000mAh (Triple 100W USB-C) keeps Macs, tablets, and meters powered during extended observing runs and remote surveys.
A new study found that Frequent Mental Distress (FMD) prevalence varies significantly across the US, with high rates in Appalachian and Mississippi Valley regions and low rates in the upper Midwest. FMD prevalence increased by at least 1 percentage point in 27 states over two periods.
The Lancet Series on Trade and Health explores how trade affects population health, highlighting policy coherence challenges. Governance of trade and health is weighted towards international trade law, with WTO's strong dispute resolution procedure, which WHO lacks.
The G8's commitment to strengthening health systems and delivering on existing global health commitments is crucial during the current financial crisis. Experts argue that a balance should be struck between fighting specific diseases and strengthening health systems to support each other effectively.
Chris Bronk, a fellow at Rice University's Baker Institute, argues that the concept of wiretapping is obsolete due to advancements in VoIP technology. He advocates for clear, openly stated policies on government surveillance adapted to the latest technology.
A recent RAND Corporation study suggests that the US is still a vital security and economic partner in East Asia, with nations seeking to maintain ties with both the US and China. The study found that none of America's East Asian allies want to choose between the two, as they prioritize cooperation over competition.
Rigol DP832 Triple-Output Bench Power Supply
Rigol DP832 Triple-Output Bench Power Supply powers sensors, microcontrollers, and test circuits with programmable rails and stable outputs.
The Lancet Editorial suggests that President-elect Barack Obama's administration should prioritize health system strengthening to address the uninsured US residents. The plan includes payment choices, universal children's health insurance, and pre-existing condition coverage.
Reagan's presidency is assessed under eight headings of public concern: welfare state, taxation, national security, the presidency, personnel, party politics, political leadership, and the person. Despite his impact on tax rates and national security, Reagan's legacy is complicated by concerns over big government and executive power.
A new study by Professor Olle Lundberg and colleagues found that policies supporting dual-earner families decrease infant mortality rates, while those supporting traditional male earner/female stay-at-home families do not. Increased generosity in basic state pensions also reduces excess mortality in old age.
The RAND Corporation report suggests delegating spending authority to the field level and requiring cross-agency experience for civilians and military officers. The report also emphasizes building success through career-wide training, enhancing foreign culture knowledge, and promoting long-term relationships with local counterparts.
AmScope B120C-5M Compound Microscope
AmScope B120C-5M Compound Microscope supports teaching labs and QA checks with LED illumination, mechanical stage, and included 5MP camera.
Experts warn that nations blocking humanitarian aid to their people are violating international human rights and potentially committing crimes against humanity. The authors argue that intervention is justified in cases where leaders deliberately block aid, leading to widespread death and suffering.
Raymond Jeanloz receives the 2008 Hans Bethe Award for demonstrating the reliability of the U.S. nuclear stockpile in the presence of a moratorium on nuclear testing. His work showcases the stability of nuclear materials, contradicting advocates for new nuclear weapons.
Researchers Theresa Jefferson and John Harrald will study social vulnerability in response to an earthquake involving the New Madrid fault. The grant from FEMA enables them to focus on displaced persons, shelter needs, commodity requirements, and special needs in Phase III of the Mid America Earthquake Center research agenda.
Private Medicare Advantage plans received 12.4% more payment per enrollee in 2008 compared to traditional Medicare fee-for-service program. Extra payments amount to $8.5 billion, exceeding expected fee-for-service costs by 10.6%.
DJI Air 3 (RC-N2)
DJI Air 3 (RC-N2) captures 4K mapping passes and environmental surveys with dual cameras, long flight time, and omnidirectional obstacle sensing.
The Perspectives system uses friendly sites to authenticate Web sites, providing an extra measure of security in cases where certificate authorities are not used. The system can detect suspicious sites and warn users about potential attacks.
The US healthcare system struggles to vaccinate adolescents, despite three new vaccines available to prevent five serious diseases. The authors identify unique issues, including consent, financing, and surveillance, that require national attention to improve adolescent immunization.
The UK SME sector is particularly vulnerable to poor information security due to a lack of expertise and awareness. A new report reveals that investing in IT does not ensure adequate information security, with people management being the key factor in preventing breaches.
A lack of integrated national health surveillance system in Canada poses significant risks to public health and hinders global response to emergencies. The absence of timely reporting mechanisms and poor coordination between federal and regional governments exacerbate the issue.
A RAND study reveals a significant increase in piracy and maritime terrorism, with piracy growing faster and more common than seaborne terrorism. The report calls for U.S. policymakers to expand maritime security measures and encourage industry use of enabling communication technologies.
Apple AirPods Pro (2nd Generation, USB-C)
Apple AirPods Pro (2nd Generation, USB-C) provide clear calls and strong noise reduction for interviews, conferences, and noisy field environments.
A new study published in Policy Studies Journal reveals that terrorism risk is a positive determinant of Homeland Security funding. The research analyzed DHS funding patterns from 2004 to 2006 and found no evidence of political influence on grant distribution.