-
Putting Nuclear Reactors in Space
A new agreement hopes to speed along a nuclear reactor technology that could be used to fuel deep-space exploration and possibly power human habitats on the Moon or Mars.
-
-
Your Smart Watch May Be Sharing Your Data
You may not realize it, but your internet-connected household devices such as the Ring doorbell, Peloton exercise bike and Nest thermostat are all exchanging data with other devices and systems over the network. These physical objects, all part of the Internet of Things (IoT), come with sensors and software, and they often use cloud computing. Most people would consider the information contained in these household items as highly private.
-
-
System Brings Deep Learning to “Internet of Things” Devices
Deep learning is everywhere. This branch of artificial intelligence curates your social media and serves your Google search results. Soon, deep learning could also check your vitals or set your thermostat. Advanced could enable artificial intelligence on household appliances while enhancing data security and energy efficiency.
-
-
Putting Games to Work in the Battle Against COVID-19
While video games often give us a way to explore other worlds, they can also help us learn more about our own — including how to navigate a pandemic. That was the premise underlying “Jamming the Curve,” a competition that enlisted over 400 independent video game developers around the world to develop concepts for games that reflect the real-world dynamics of COVID-19.
-
-
New Body Armor Offers Better Knife Protection
The number of knife attacks in Britain has increased over the past few years, while police officers and correctional personnel must contend with an increasing threat from makeshift weapons, such as shanks and spikes. PPSS Group the other day announced a replacement for their polycarbonate-based stab resistant body armor. According to company CEO Robert Kaiser, the new body armor is lighter, thinner, more effective, and more functional.
-
-
Cloud-Based Framework Improves Efficiency in Disaster-Area Management
Researchers have, for the first time, designed a cloud-based autonomous system framework utilizing the standard messaging protocol for the internet-of-things (IoT). This framework is robust to network-denied environments by utilizing each vehicle, along with a clustering algorithm, to maximize the network coverage area. Also for the first time, researchers have implemented a cloud-based, highly efficient control system to aid first responders in disaster-area management.
-
-
World's Fastest Open-Source Intrusion Detection Is Here
Intrusion detection systems are the invisible intelligence agencies in computer networks. They scan every packet of data that is passed through the network, looking for signs of any one of the tens of thousands of different types of cyberattacks they’re aware of. A newly developed intrusion detection system achieves speeds of 100 gigabits per second using a single server.
-
-
Policy, Not Tech, Spurred Danish Dominance in Wind Energy
In emerging renewable energy industries, are producers’ decisions to shut down or upgrade aging equipment influenced more by technology improvements or government policies? It’s an important long-term question for policymakers seeking to increase renewable electricity production, cost-effectiveness and efficiency with limited budgets. Anew study focused on Denmark, a global leader in wind energy found that government policies have been the primary driver of that industry’s growth and development.
-
-
FBI: Boogaloo Extremists Acquired 3D-Printed Machine Gun Parts
Depending on their configuration, 3D-printed guns contain no metal parts, and thus can be smuggled into metal detectors-protected venues. In a criminal complaint filed against a West Virginia men selling 3D-printed gun components, the FBI says his customers included multiple members of the Boogaloo movement, a heavily armed extremist anti-government group.
-
-
A New World of Warcraft
In the past decade, high tech tools have proliferated in the world’s fighting forces. At least 80 nations can now deploy remote-controlled drones. Will the widespread use of digitally enhanced arsenals prove a destabilizing, if not destructive, element in the complex struggles among states? Not necessarily, argues MIT assistant professor Erik Lin-Greenberg.
-
-
Tricking Fake News Detectors with Malicious User Comments
Fake news detectors, which have been deployed by social media platforms like Twitter and Facebook to add warnings to misleading posts, have traditionally flagged online articles as false based on the story’s headline or content. However, recent approaches have considered other signals, such as network features and user engagements, in addition to the story’s content to boost their accuracies.
-
-
Mobile Flood Tool
The U.S. Geological Survey announced Friday the completion of a new mobile tool that provides real-time information on water levels, weather and flood forecasts all in one place on a computer, smartphone or other mobile device. The new access anywhere interactive map helps minimize loss of life and property.
-
-
Detecting “Deepfake” Videos by Checking for the Pulse
With video editing software becoming increasingly sophisticated, it’s sometimes difficult to believe our own eyes. Did that actor really appear in that movie? Did that politician really say that offensive thing? Some so-called “deepfakes” are harmless fun, but others are made with a more sinister purpose. But how do we know when a video has been manipulated?
-
-
Improving Security, Usability of Zoom's End-to-End Encryption Protocol
During the global coronavirus pandemic, many people have been working, teaching and learning from home and utilizing Zoom as a way to have face-to-face communication. Although this is a main resource for virtual human interaction, there are still concerns for back-end security issues and meeting hackings.
-
-
EU Uses Chinese Technology Linked to Muslim Internment Camps in Xinjiang
In the fight against coronavirus, the EU is using thermal cameras produced by Chinese tech giant Hikvision. The firm has been linked to the oppression of Uighurs and other Muslim minorities in China’s Xinjiang province.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
AI-Controlled Fighter Jets May Be Closer Than We Think — and Would Change the Face of Warfare
Could we be on the verge of an era where fighter jets take flight without pilots – and are controlled by artificial intelligence (AI)? US R Adm Michael Donnelly recently said that an upcoming combat jet could be the navy’s last one with a pilot in the cockpit.
AI and the Future of the U.S. Electric Grid
Despite its age, the U.S. electric grid remains one of the great workhorses of modern life. Whether it can maintain that performance over the next few years may determine how well the U.S. competes in an AI-driven world.
Using Liquid Air for Grid-Scale Energy Storage
New research finds liquid air energy storage could be the lowest-cost option for ensuring a continuous power supply on a future grid dominated by carbon-free but intermittent sources of electricity.
Enhanced Geothermal Systems: A Promising Source of Round-the-Clock Energy
With its capacity to provide 24/7 power, many are warming up to the prospect of geothermal energy. Scientists are currently working to advance human-made reservoirs in Earth’s deep subsurface to stimulate the activity that exists within natural geothermal systems.
Experts Discuss Geothermal Potential
Geothermal energy harnesses the heat from within Earth—the term comes from the Greek words geo (earth) and therme (heat). It is an energy source that has the potential to power all our energy needs for billions of years.
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”
Autonomous Weapon Systems: No Human-in-the-Loop Required, and Other Myths Dispelled
“The United States has a strong policy on autonomy in weapon systems that simultaneously enables their development and deployment and ensures they could be used in an effective manner, meaning the systems work as intended, with the same minimal risk of accidents or errors that all weapon systems have,” Michael Horowitz writes.
Are We Ready for a ‘DeepSeek for Bioweapons’?
Anthropic’s Claude 4 is a warning sign: AI that can help build bioweapons is coming, and could be widely available soon. Steven Adler writes that we need to be prepared for the consequences: “like a freely downloadable ‘DeepSeek for bioweapons,’ available across the internet, loadable to the computer of any amateur scientist who wishes to cause mass harm. With Anthropic’s Claude Opus 4 having finally triggered this level of safety risk, the clock is now ticking.”