• What Causes Steel Corrosion in Reinforced Concrete

    Since the Egyptian pyramids and the Roman Coliseum were built, mankind has been searching for an affordable, versatile building material, that can be easily manufactured and transported, and, above all, which is durable. Concrete has all these characteristics, but there is a problem: the corrosion of steel bars that internally strengthen structures made of reinforced concrete. This situation causes rapid, internal deterioration of frames and may even lead to buildings collapsing.

  • New Reactor Designs Will Degrade Waste More Rapidly

    Renewed interest in nuclear power as a viable option for generating electricity has been accompanied by steady progress in reactor design. Advanced reactors offer the promise of greater fuel efficiency and less radioactive waste generation compared with the water-cooled models that have dominated the nuclear power landscape for decades. Newer designs, however, will operate at higher temperatures and use highly corrosive coolants — like liquid metal, molten salt, or high-temperature gas — all of which would rapidly degrade many of the materials used in conventional nuclear reactors.

  • Browser Tool Helps Researchers ID Malicious Websites, Code

    Researchers from North Carolina State University have developed an open-source tool that allows users to track and record the behavior of JavaScript programs without alerting the websites that run those programs. The tool, called VisibleV8, runs in the Chrome browser and is designed to detect malicious programs that are capable of evading existing malware detection systems.

  • Bio-Inspired Theoretical Research May Improve Robots’ Effectiveness on Battlefield

    In an effort to make robots more effective and versatile teammates for soldiers in combat, Army researchers are on a mission to understand the value of the molecular living functionality of muscle, and the fundamental mechanics that would need to be replicated in order to artificially achieve the capabilities arising from the proteins responsible for muscle contraction.

  • First Statewide Testing of ShakeAlert in the United States

    Earlier this month, the U.S. Geological Survey and the State of California pressed the “go” button to allow the first-ever statewide public testing of the California Early Earthquake Warning System, which is powered by USGS’s earthquake early warning alerts, called ShakeAlerts. Alerts will be delivered by two independent methods, first over the federal Wireless Emergency Alert (WEA) system and second through the University of California Berkeley’s MyShake smartphone app.

  • Techno-Fix Futures Will Only Accelerate Climate Chaos – Don’t Believe the Hype

    Thanks to the efforts of climate activists, the climate and ecological emergency has never been more prominent. But acknowledging the problem is just a starting point. Now this momentum must be harnessed to dramatically reduce greenhouse gas emissions and reverse habitat destruction.

  • Why Did Microsoft Fund an Israeli Firm that Surveils West Bank Palestinians?

    Microsoft has invested in AnyVision, an Israeli startup which has developed a facial recognition technology used by Israel’s military and intelligence services to surveil Palestinians throughout the West Bank, in spite of the tech giant’s public pledge to avoid using the technology if it encroaches on democratic freedoms. The surveillance technology lets customers identify individuals and objects in any live camera feed, such as a security camera or a smartphone, and then track targets as they move between different feeds. The Israeli surveillance project is similar to China’s surveillance of its Uighur minority population. China is using artificial intelligence and facial recognition technology for a pervasive, intrusive monitoring of the Uighurs, a Muslim group living in western China.

  • Israeli Solution Prevents Bridge and Tunnel Disasters

    People responsible for the health of bridges, tunnels and elevated highways can now see a real-time, cloud-based, 3D “medical report” thanks to technology invented at Israeli startup Dynamic Infrastructure. The company’s proprietary deep-learning image analysis compares daily images of the structure with older images extracted from past periodic inspections.

  • The Hidden Politics of Climate Engineering

    At this point, the greatest danger of climate engineering may be how little is known about where countries stand on these potentially planet-altering technologies. Who is moving forward? Who is funding research? And who is being left out of the conversation?

  • Artificial Intelligence Research Needs Responsible Publication Norms

    After nearly a year of suspense and controversy, any day now the team of artificial intelligence (AI) researchers at OpenAI will release the full and final version of GPT-2, a language model that can “generate coherent paragraphs and perform rudimentary reading comprehension, machine translation, question answering, and summarization—all without task-specific training.” Rebecca Crootof writes in Lawfare that when OpenAI first unveiled the program in February, it was capable of impressive feats: Given a two-sentence prompt about unicorns living in the Andes Mountains, for example, the program produced a coherent nine-paragraph news article. At the time, the technical achievement was newsworthy—but it was how OpenAI chose to release the new technology that really caused a firestorm.

  • Why America Isn’t Equipped for the New Rules of War

    Sean McFate is a former paratrooper in the U.S. Army’s 82nd Airborne Division; he’s also worked as a private military contractor in West Africa. Today he’s a professor at the National Defense University and Georgetown’s School of Foreign Service.  His book The New Rules of War, published earlier this year, dissects the ways warfare must change in order for America to succeed. MIT Technology Review’s war reporter Janine di Giovanni sat down to ask him about his vision for the future of conflict.

  • AI Could Be a Disaster for Humanity. A Top Computer Scientist Thinks He Has the Solution.

    Stuart Russell is a leading AI researcher who co-authored the top textbook on the topic. He has also, for the last several years, been warning that his field has the potential to go catastrophically wrong. In a new book, Human Compatible, he explains how. AI systems, he notes, are evaluated by how good they are at achieving their objective: winning video games, writing humanlike text, solving puzzles. If they hit on a strategy that fits that objective, they will run with it, without explicit human instruction to do so.

  • Deflecting Massive Asteroids With a Nuclear Impulse

    Researchers have completed the first ever in-depth investigation into how an asteroid would respond to a nuclear deflection attempt. “The whole purpose of studies like this is to help us shorten the response timeline if we were to see something coming at us,” said one researcher. “We don’t want to have to scramble to figure out whether to use an impactor or a nuclear device on a particular asteroid. These studies help us define those thresholds.”

  • Cryptography without Using Secret Keys

    Most security applications, for instance access to buildings or digital signatures, use cryptographic keys that must at all costs be kept secret. That also is the weak link: who will guarantee that the key doesn’t get stolen or hacked? Researchers, using a physical unclonable key (PUK) and the quantum properties of light, researchers present a new type of data security that does away with secret keys.

  • Patching Legacy Software Vulnerabilities Rapidly in Mission-Critical Systems

    There are a vast number of diverse computing devices used to run the critical infrastructure our national security depends on – from transportation systems to electric grids to industrial equipment. While the amount of deployed vulnerable software is growing exponentially, the effective means of addressing known vulnerabilities at scale are limited. DARPA seeks to develop targeted software patches to rapidly repair legacy binaries in mission-critical systems, while assuring system functionality is not affected.