-
Super-strength gear competition heats up
Berkeley Bionics-Lockheed Martin team challenges the Sarco-Raytheon team for the super solider suit of the future; suit will allow soldiers the wearer to carry up to 200 pounds without much effort — and sprint up to 10 miles per hour in short bursts
-
-
New software allows laptops to talk back boldly to laptop thieves
Your laptop has been stolen? New software allows you to tell those thieves exactly — and when we say exactly, we mean exactly — what you think of them; software also helps police locate the stolen computer
-
-
Intelligence, law enforcement face another hurdle: encrypted VoIP
The intelligence community and law enforcement already are concerned about the difficult they have eavesdropping in Skype communications; a U.K. start-up is going to make life more difficult for them by encryption VoIP communications and concealing more conversations
-
-
Strong future for independent research
Despite the current economic downturn, independent research organizations remain optimistic; many areas of research and development — chief among them energy security, energy conversion, and defense — already see bipartisan support for increased funding
-
-
Random antenna arrays boost emergency communications
When first responders rush to a disaster scene, they are often met with large amount of rubble; the vast amount of metal and steel-reinforced concrete in buildings and rubble often interferes with or blocks radio signals; a new antenna array solves this problem
-
-
New facial, gait recognition software to be integrated in CCTVs
BAE Systems and OmniPerception work on developing a gait and facial behavior recognition to be integrated into street corner CCTVs; it will make identifying known criminals easier
-
-
Dire climate scenario: Mass migrations and war
Lord Nicholas Stern, the eminent economist, says severe climate shifts and sea-level rises would “transform where people can live”: “People would move on a massive scale. Hundreds of millions, probably billions of people would have to move if you talk about 4-, 5-, 6-degree increases” (7 to 10 degrees Fahrenheit)
-
-
Lab-on-a-chip detects pollutants, disease, and biological weapons
Researchers develop nano-sized laboratory, complete with a microscopic workbench, to measure water quality in real time; breakthrough will help keep water safe from pollution and bioterrorist threats
-
-
TSA wants to screen your baggage -- emotional baggage, that is
To improve on X-ray and millimeter-wave scanning and go beyond group profiling, some suggest screening passengers for hostile intentions
-
-
Calculations show Iran's 2 February launch used beefed-up rocket
Calculations show that Iran’s 2 February missile launch involved a more sophisticated and powerful rocket than had been initially thought; this two-stage vehicles, with more powerful fuel, are capable of lifting a nuclear warhead farther; Europe — but not yet the United States — is now within Iranian missile range
-
-
Iran says it has built long-distance UAV
Iran says it has developed a UAV with a range of more than 950 kilometers; it is not yet clear what electronic and other capabilities Iran has mounted on the drone
-
-
BriefCam video synopsis integrated in Pelco's DVR
BriefCam’s technology integrated with Pelco’s DX8100 series of digital video recorders; solution allows for one day of surveillance camera footage to be summarized into as little as a few minutes
-
-
Unisys: Technology "consumerization," mobility risks key drivers of security investments
A Unisys briefing says that the growing pervasiveness of technology consumerization and mobility opens businesses to new risks across a broader spectrum; economy compels greater need for collaboration, more intelligent systems, and better fraud prevention; biometric use and acceptance also to increase
-
-
Doomsday seed vault's stores are growing
In 1903, U.S. farmers planted 578 varieties of beans; by 1983 just 32 varieties remained in seedbanks; 46 countries collaborate to rescue some 53,000 of the 100,000 crop samples identified as endangered
-
-
Researchers spoof, bypass face-recognition authentication systems
Vietnamese researchers have cracked facial recognition technology in Lenovo, Asus, and Toshiba laptops; the researchers demonstrated feat at this week’s Black Hat DC event
-
More headlines
The long view
A Shining Star in a Contentious Legacy: Could Marty Makary Be the Saving Grace of a Divisive Presidency?
While much of the Trump administration has sparked controversy, the FDA’s consumer-first reforms may be remembered as its brightest legacy. From AI-driven drug reviews to bans on artificial dyes, the FDA’s agenda resonates with the public in ways few Trump-era policies have.
Risk Assessment with Machine Learning
Researchers utilize geological survey data and machine learning algorithms for accurately predicting liquefaction risk in earthquake-prone areas.
Foundation for U.S. Breakthroughs Feels Shakier to Researchers
With each dollar of its grants, the National Institutes of Health —the world’s largest funder of biomedical research —generates, on average, $2.56 worth of economic activity across all 50 states. NIH grants also support more than 400,000 U.S. jobs, and have been a central force in establishing the country’s dominance in medical research. Waves of funding cuts and grant terminations under the second Trump administration are a threat to the U.S. status as driver of scientific progress, and to the nation’s economy.
The True Cost of Abandoning Science
“We now face a choice: to remain at the vanguard of scientific inquiry through sound investment, or to cede our leadership and watch others answer the big questions that have confounded humanity for millennia —and reap the rewards.”
Bookshelf: Smartphones Shape War in Hyperconnected World
The smartphone is helping to shape the conduct and representation of contemporary war. A new book argues that as an operative device, the smartphone is now “being used as a central weapon of war.”
New Approach Detects Adversarial Attacks in Multimodal AI Systems
New vulnerabilities have emerged with the rapid advancement and adoption of multimodal foundational AI models, significantly expanding the potential for cybersecurity attacks. Topological signatures key to revealing attacks, identifying origins of threats.