Infrastructure

  • New report says U.S. Air Force should prepare for cyberwar

    New Rand Corp. report argues that the U.S. military branches must treat cyberwar as another emerging field of battle — one that both amplifies the threat of physical combat and presents new tactical challenges unfamiliar to everyone, not just the armed forces

  • A new Amsterdam neighborhood floats on a lake

    The Dutch experiment with a new concept for addressing over-crowding, flooding, and rising sea-level problems: floating neighborhoods

  • Boeing eyes energy sector amid defense cuts

    Boeing, the U.S. second largest military contractor, cites its expertise as it bids on slices of the $20 billion U.S. power-grid market; to compensate for cuts in funds for defense programs in which it was traditionally involved, the company is also moving into the helicopters, UAV, cyber-security, and intelligence businesses

  • NRC rejects Westinghouse's new nuclear reactor design

    In what must be seen as a setback for the nuclear power industry, the NRC said that a key component of Westinghouse’s new reactor design might not withstand events like earthquakes and tornadoes

  • China bolsters its information warfare capabilities

    One of the chief strategies driving the process of modernization (known in China as “informatization”) in the PLA is the coordinated use of CNO, electronic warfare (EW), and kinetic strikes designed to
    strike an enemy’s networked information systems, creating “blind spots” that PLA forces could exploit at predetermined times or as the tactical situation warranted

  • Landslide detector to be developed

    Researchers are working in developing an early-warning acoustic sensor for the detection of landslides; current devices available for the early detection of slope failures are costly and technically limited

  • Computer models predicts power outages during hurricanes

    Researchers develop computer model that can estimate how many power outages will occur across a region as a hurricane is approaching; having accurate estimates, prior to the storm’s arrival, of how many outages will exist and where they will occur, will allow utilities to better plan their crew requests and crew locations

  • Carbon fibers improve blast, impact resistance of conventional reinforced concrete

    Researchers find that adding longer carbon fibers to conventional reinforced concrete significantly improves a structure’s ability to withstand blasts, hurricanes, and other natural disasters

  • VA hospital builds $750,000 anti-terrorism fence

    Officials at Charles George Veterans Affairs Hospital say that terrorists will not go after military targets, which are hard to hit, but will instead aim for places such as hospitals with the goal of disrupting and disheartening the public

  • Robust hierarchical metropolitan quantum cryptography network

    The security of a majority of classical cryptography is based on the complexity of the cipher algorithms and the development of distributed computing and specific hacking chips; this may no longer be sufficient, as quantum computing has become a serious threat to classical cryptography; the solution: quantum encryption

  • iPhones, social networking add to IT security woes

    The security staff at private and government organizations have new security problems to contend with: smartphones and social networking

  • UK.gov's G Cloud may have security silver lining after all

    Cloud computing offers many benefits, but enhanced security is not one of them — or is it? An expert says that the emergence of cloud computing is making it possible to take a new approach to security; until now, the U.K. government has kept its work on information security in specialist bodies such as GCHQ and CESG, separate from the development of business functions; “The cloud gives us the opportunity to get the specification right before we get too far down the track,” he says

  • The personal spy: the smartphone in your pocket may be spying on you, II

    The advances in smartphone technology could well be exploited in much the same way that e-mail and the Internet can be used to “phish” for personal information such as bank details

  • Tornado threat increases as Gulf hurricanes get larger

    New study predicted exactly the number of hurricanes seen for Hurricane Ike: 33; tornadoes that occur from hurricanes moving inland from the Gulf Coast are increasing in frequency

  • Growing demand for IT forensics experts

    As reliance on the Internet increases, so do Internet-related crimes; the growing need to investigate such crimes and find out the culprits and their methods has increased demand for IT forensics experts