-
Compressed-air gun stops terrorist boats in their tracks
Compressed air is used on the shoulder-held device to propel a line from a pursuing boat which drags with it a high-tech, high tensile net to disable the target craft’s propulsion system
-
-
SnatchLatch releases affordable trailer door security
SnatchLatch HT provides bolt seal security on a broad range of heavy trucking trailers, containers, dry vans, and reefers
-
-
Police to use DNA "mugshots" as a predictive tool to narrow search
Scientist say that rather than simply try to match DNA to individuals already in their database, DNA should be used to suggest what a suspect might look like
-
-
U.S. government eyes University of Maine's bridge technology
Researchers at the University of Maine developed a “bridge-in-a-backpack” technology — so called because of its light weight and the portability of its components; the bridge uses carbon-fiber tubes that are inflated, shaped into arches, and infused with resin before being moved into place
-
-
"Active cloak" protects buildings from earthquakes
Researchers say real objects could be cloaked by active cloaking — which means the technology uses devices that actively generate electromagnetic fields rather than being composed of “metamaterials” (exotic metallic substances) that passively shield objects from passing electromagnetic waves
-
-
Georgia cat awarded online high school diploma
A Macon, Georgia-based cat won a GED from Jefferson High School Online; all the cat needed to do to earn her sheepskin was answer fourteen questions — but it could nit have been too difficult: each question offers four possible answers, and you have four tries — with hints — to get each of them correct; there is no time limit
-
-
Teenager passes grueling "getting on bus" test
A 15-year old Briton was surprised to be awarded “Using Public Transport (Unit 1)” certificate; it turned out he had successfully met the challenge by catching a bus while on a summer outdoor activities scheme at the city of Bury
-
-
Tiny Nano Air Vehicle (NAV) to help in in-door surveillance
California company develops tiny UAV (10 gram, a 7.5-centimeter wingspan) that hovers and climbs with flapping wings; the NAV can explore caves and other hiding places, relaying GPS data and images to base
-
-
NASA short on funds to keep up with killer asteroids
NASA is charged with seeking out nearly all the asteroids that threaten Earth; trouble is, it does not have the money to do the job
-
-
Competition for U.S. Marines' supply robocopter down to two
The U.S. Marines are looking for unmanned supply helicopters that can deliver ten tons of supplies across distances of 150 miles in 24 hours; they also have to be able to hover at high altitudes (say, up in the Hindu Kush mountains)
-
-
Making software safer
More and more security systems in aircraft and motor vehicles rely on software for their operation; Aussie researchers develop away to make sure such software is safe
-
-
"Point-and-toss" UAV in field demonstration
Florida-based IATech used the Association for Unmanned Vehicle Systems International’s biannual field demonstration to show its point-and-toss UAV: the unit measures 3 feet across and is thrown like a paper airplane; it costs only about $25,000
-
-
All-titanium campus bridge show way for defense industry
University of Akron, Defense Metals Technology Center co-sponsor design contest for titanium pedestrian bridge on university’s campus; titanium is a strong, lightweight, virtually corrosion-proof (but expensive) metal; a high-profile venture demonstrating titanium’s feasibility in commercial infrastructure projects could spark greater demand and open new markets for titanium
‘Avant-garde’ all-titanium span could spur other projects - and cut Pentagon’s costs -
-
TSA conducting scanning tech evaluation
TSA tests both millimeter wave and backscatter imaging technologies to address privacy concerns; the aim is to reduce concerns about privacy while strengthening the ability to detect metallic and non-metallic threats
-
-
University of Detroit Mercy receives cyber security research contract
The aim of the $551,500 federal contract is to develop and disseminate the knowledge necessary to ensure that the software that enables America’s business and critical infrastructure is safe and secure
-
More headlines
The long view
A Shining Star in a Contentious Legacy: Could Marty Makary Be the Saving Grace of a Divisive Presidency?
While much of the Trump administration has sparked controversy, the FDA’s consumer-first reforms may be remembered as its brightest legacy. From AI-driven drug reviews to bans on artificial dyes, the FDA’s agenda resonates with the public in ways few Trump-era policies have.
Risk Assessment with Machine Learning
Researchers utilize geological survey data and machine learning algorithms for accurately predicting liquefaction risk in earthquake-prone areas.
Foundation for U.S. Breakthroughs Feels Shakier to Researchers
With each dollar of its grants, the National Institutes of Health —the world’s largest funder of biomedical research —generates, on average, $2.56 worth of economic activity across all 50 states. NIH grants also support more than 400,000 U.S. jobs, and have been a central force in establishing the country’s dominance in medical research. Waves of funding cuts and grant terminations under the second Trump administration are a threat to the U.S. status as driver of scientific progress, and to the nation’s economy.
The True Cost of Abandoning Science
“We now face a choice: to remain at the vanguard of scientific inquiry through sound investment, or to cede our leadership and watch others answer the big questions that have confounded humanity for millennia —and reap the rewards.”
Bookshelf: Smartphones Shape War in Hyperconnected World
The smartphone is helping to shape the conduct and representation of contemporary war. A new book argues that as an operative device, the smartphone is now “being used as a central weapon of war.”
New Approach Detects Adversarial Attacks in Multimodal AI Systems
New vulnerabilities have emerged with the rapid advancement and adoption of multimodal foundational AI models, significantly expanding the potential for cybersecurity attacks. Topological signatures key to revealing attacks, identifying origins of threats.