-
DARPA seeks deep-learning AI to cope with flood of information
The growing use of UAVs to loiter over enemy territory and send images and streaming videos back to HQ has created a glut of information; DARPA seeks a better, deeper, and more layered artificial intelligence to help the intelligence community cope with the avalanche of information coming in
-
-
Study: Catastrophic rise in sea levels "distinct possibility" this century
New study — based on fluctuations in sea levels the last time Earth was between ice ages, as it is now — shows that oceans rose some three meters in only decades due to collapsing ice sheets
-
-
NIST offers five encryption tips
There are many encryption algorithms, techniques, and products — and many user devices and threats against them; NIST offers five encryption tips
-
-
U.S. tests large flying wing-type UAV in Afghanistan
Hazy photographs emerged of a large flying-wing UAV — or, rather, UCAV (unmanned combat air vehicle) —on a runway in a military base in Afghanistan; the shape and assumed capabilities indicate growing role of unmanned system in attack missions
-
-
One-story masonry building withstands strong jolts during seismic tests
University of California, San Diego researchers design a one-story masonry structure and showed it could survive two days of intense earthquake jolts
-
-
Watching the watchers: new solution monitors CCTV operators
People watching CCTV images back in the control rooms often have too many screens to monitor at once, and as a result may miss the criminal or antisocial activities they are there to spot; a new solution monitor the monitors
-
-
Latest in nonlethal weapons: Poo-flinging catapult
A colorful English businessman, tired of his property and business being burglarized, used a catapult loaded with chicken excrement to deter burglars; the police said the smart-poo device was illegal because it could not be said to use “reasonable force”
-
-
Protection from terrorism affects far reaches of Montana
When you think of terrorism and preparations for terrorist attacks, you think of big cities; the remote precincts of Montana, however, are not exempt; the local inhabitants, who foot the bill for local homeland security, want to know whether rural dams are really terrorist targets
-
-
New curved laser beams may be used to lessen threats of thunderclouds
U.S. physicists have created the first curved laser beams; the laser’s plasma channels could be used to control lightning strikes by firing laser pulses into thunderclouds
-
-
Cisco acquires Tidal Software for $105 million
Cisco buys Palo Alto-based Tidal Software to enhance the next-generation data centers it is building; Cisco is also planning on challenging IBM and Hewlett-Packard by building servers
-
-
Germany is target of sustained cyberattacks from China
The German government is constantly the target of hackers seeking to insert spy programs into its computer systems; the attacks are becoming more and more sophisticated
-
-
Seeing through concrete, clearly
Insurgents and terrorists fight from within civilian structures, making it difficult for soldiers and first responders to respond without injuring many civilians; DARPA wants a solution which would allow soldiers to look through concrete walls and give them a detailed picture of a building’s interior — right down to the fixtures
-
-
£8.5 million in grants for innovative businesses in east England
U.K. regional development agency has £8.5 million in grants for research and development of hi-tech products and proof of concept; businesses may also benefit from funds available from the European Regional Development Fund
-
-
CSIRO to lead effort to standardize sensor network information sharing
Sensors, and sensor networks, are the wave of the future (the wave is already here, in fact) in allowing remote monitoring of everything from machinery to buildings’ temperature to perimeter fences to water quality to patients’ health and much, much more; Aussie research organization now leads the effort to develop standards for sharing information collected by sensors and sensor networks over the Internet
-
-
Manipulating Google searches as counter-terrorism tool
The U.K. government will train pro-West Islamic groups to game Google searches in order to fight the influence of radicals; search engine optimization techniques will make moderate Islamic groups come up first in Google searches
-
More headlines
The long view
A Shining Star in a Contentious Legacy: Could Marty Makary Be the Saving Grace of a Divisive Presidency?
While much of the Trump administration has sparked controversy, the FDA’s consumer-first reforms may be remembered as its brightest legacy. From AI-driven drug reviews to bans on artificial dyes, the FDA’s agenda resonates with the public in ways few Trump-era policies have.
Risk Assessment with Machine Learning
Researchers utilize geological survey data and machine learning algorithms for accurately predicting liquefaction risk in earthquake-prone areas.
Foundation for U.S. Breakthroughs Feels Shakier to Researchers
With each dollar of its grants, the National Institutes of Health —the world’s largest funder of biomedical research —generates, on average, $2.56 worth of economic activity across all 50 states. NIH grants also support more than 400,000 U.S. jobs, and have been a central force in establishing the country’s dominance in medical research. Waves of funding cuts and grant terminations under the second Trump administration are a threat to the U.S. status as driver of scientific progress, and to the nation’s economy.
The True Cost of Abandoning Science
“We now face a choice: to remain at the vanguard of scientific inquiry through sound investment, or to cede our leadership and watch others answer the big questions that have confounded humanity for millennia —and reap the rewards.”
Bookshelf: Smartphones Shape War in Hyperconnected World
The smartphone is helping to shape the conduct and representation of contemporary war. A new book argues that as an operative device, the smartphone is now “being used as a central weapon of war.”
New Approach Detects Adversarial Attacks in Multimodal AI Systems
New vulnerabilities have emerged with the rapid advancement and adoption of multimodal foundational AI models, significantly expanding the potential for cybersecurity attacks. Topological signatures key to revealing attacks, identifying origins of threats.