Homeland Security News Wire

  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed
Home

Sci-Tech

  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water

  • Advanced Nanotechnology Research, LANCER

    Lockheed Martin and Rice University launch strategic partnership to develop center which will develop new technologies for a broad range of applications in electronics, energy, and security

    • Read more
  • Partnership to produce sugarcane-based diesel

    High corn prices have driven California-based biofuel specialist Amyris to join with a Brazilian company to produce sugarcane-based diesel

    • Read more
  • Straw power planned

    With more and more companies turning to biofuels as an alternative to fossil fuels, a debate has erupted over the food-energy trade-off involved; a Welsh company bypasses this debate by planning to generate energy from straw

    • Read more
  • Technological breakthrough in the fight to cut greenhouse gases

    New, efficient method found to convert waste carbon dioxide (CO2) into chemical compounds known as cyclic carbonates; researchers estimate that the technology has the potential to use up to 48 million tons of waste CO2 per year, reducing the U.K. emissions by about four percent

    • Read more
  • Modernizing the U.S. electrical grid

    The U.S. Department of Energy will invest $50 million in demonstration project aiming to improve efficiency in the U.S. electricity grid

    • Read more
  • Government scrapping virtual fence on Arizona-Mexico border

    Boeing’s Project 28 — showcasing advanced technologies to be used in making U.S. borders more secure — was hobbled from the start by technological glitches and delays; it delivered much less than what was promised, and DHS decides to scrap it

    • Read more
  • The WiMax interoperability solution // By Daniel Zubairi, CISSP

    Conversation with Mark Adams, chief architect of mobility at Northrop Grumman, on using WiMax for public safety and civil defense

    • Read more
  • How much water is needed to produce various types of energy?

    Most of the energy we consume requires the use of water for its generation; water is a dwindling resource, so researchers wanted to know how much water is required to produce different types of energy

    • Read more
  • NTR invests in SES

    Irish renewable energy company buys controlling interest in SES; SES is developing two of the world’s largest solar generating projects in the Imperial Valley and Mojave Desert

    • Read more
  • Sustaining bridge infrastructure through Bridge Information Modeling

    Bentley offers end-to-end bridge solution which will allow bridge engineers to create and renovate bridge infrastructure

    • Read more
  • AWWA urges scientific approach to pharmaceuticals in drinking water

    The sky may not be falling: Stories about pharmaceutical traces in U.S. drinking water abound, but an expert from Southern Nevada Water Authority testifies before Senate subcommittee that worries about the ill effects of such traces are exaggerated

    • Read more
  • Emerging water contaminants a growing worry

    As worries about pharmaceutical contamination of U.S. drinking water increase, a non-profit organization increases its efforts to build a coalition of organizations to research the issue

    • Read more
  • Robots in search-and-rescure competition

    A robot competition takes place in Germany this week; the robots compete with each other in how well they traverse, autonomously and without any input from handlers, through a maze resembling the aftermath of a natural disaster; robots sniff out toy dolls that either emit CO2, give off heat, make noise, or move

    • Read more
  • Patent "trolls" bill not likely soon

    Patent trolls, who file patents without any intention of developing them, have been the bane of the technology sector (remember the Blackberry case?); a bill to limit the rights of trolls passed the House but stalled in a Senate committee

    • Read more
  • Swedish researchers find vulnerability in quantum encryption technology

    Quantum encryption is supposed to offer air-tight security owing to the laws of quantum mechanics; to send a key over the quantum channel you must simultaneously send additional data over the traditional Internet channel, and then verify that the classical data has not been changed through an authentication process; data traveling though the quantum channel was 100 percent secure, but the combined system showed vulnerabilities

    • Read more
  • « first
  • ‹ previous
  • …
  • 571
  • 572
  • 573
  • 574
  • 575
  • 576
  • 577
  • 578
  • 579
  • …
  • next ›
  • last »

More headlines

  • Trump Administration Opens New Front to Strip Harvard of Federal Funding
  • Feds issue 'information requests' on University of Chicago international students, admissions practices
  • New airport scanners are better at spotting liquid explosives, but many airports lack them
  • DHS S&T Delivers New Capability for Detecting Presence of Life to Law Enforcement
  • S. Korea says DeepSeek transferred data to Chinese company without consent
  • Hackers using AI-produced audio to impersonate tax preparers, IRS
  • The pioneering science linking climate to weather disasters
  • Surveillance tech advances by Biden could aid in Trump’s promised crackdown on immigration
  • Trump administration’s AI team comes into focus, as agencies reach 1,700 AI use cases
  • WATCH: AI's Role at DHS with Gary Barber, Matthew Ferraro
  • Nuclear reactor restarts, but Japan’s energy policy in flux
  • Hawking says he lost $100 bet over Higgs discovery
  • Kansas getting $500K in law enforcement grants
  • Bill widens Sacramento police, sheriff’s contract security opportunities
  • DHS awards $97 million in port security grants
  • DHS awarding $1.3 billion in 2012 preparedness grants
  • Cellphone firms share location data with law enforcement, not users
  • Residents of Murrieta, California, will have to subscribe for emergency services
  • Ohio’s Homeland Security funding drops sharply
  • Ports of L.A., Long Beach get Homeland Security grants
  • Homeland security gets involved with Indiana water conservation
  • LAPD embraces “predictive policing”
  • New GPS rival is hack-proof
  • German internal security service head quits over botched investigation
  • Americans favor Obama to defend against space aliens: poll
  • U.S. Coast Guard creates “protest-free zone” in Alaska oil drilling zone
  • Congress passes measure to enhance Israel security ties
  • Wickr enables encrypted, self-destructing iPhone messages
  • NASA explains Why clocks got an extra second on 30 June
  • Cybercrime disclosures rare despite new SEC rule
  • First nuclear reactor to go back online since Japan disaster met with protests
  • Israeli security fence architect: Why the barrier had to be built
  • DHS allocates nearly $10 million to Jewish nonprofits
  • Turkey deploys troops, tanks to Syrian border
  • Israel fears terror attacks on Syrian border
  • Ontario’s emergency response protocols under review after Elliot Lake disaster
  • Colorado wildfires to raise insurance rates in future years
  • Colorado fires threaten IT businesses
  • Improve your disaster recovery preparedness for hurricane season
  • London 2012 business continuity plans must include protecting information from new risks

Free Subscription

The long view

  • Building Trust into Tech: A Framework for Sovereign Resilience

    Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.

    • Read more
  • Researchers Unveil First-Ever Defense Against Cryptanalytic Attacks on AI

    Security researchers have developed the first functional defense mechanism capable of protecting against “cryptanalytic” attacks used to “steal” the model parameters that define how an AI system works.

    • Read more
  • Data Centers’ Insatiable Demand for Electricity Will Change the Entire Energy Sector

    When the first large language models were unleashed, it triggered a headache for authorities around the world as they tried to figure out how to satisfy data centers’ endless demand for electricity.

    • Read more
  • Will Texas Actually Run Out of Water?

    You asked our AI chatbot about Texas’ water supply. We answered some of the questions that it couldn’t.

    • Read more
  • BIOMETRICS
  • Border/Immig.
  • Business
  • Cybersecurity
  • Detection
  • Disasters
  • Government
  • Infrastructure
  • Public Safety
  • Public health
  • Regional
  • Sci-Tech
  • Surveillance
  • Terrorism
  • Transportation
  • Water
  • Home
  • About us
  • Subscribe
  • Advertise
  • Contact
  • RSS Feed

Homeland Security News Wire

  • All
  • Regional
    • Africa
    • Americas
    • Asia / Pacific
    • Europe
    • Middle East
  • Water
  • Biometrics
    • Access control
    • E-documents
    • Biometric databases
    • Biometric technologies
    • E-commerce
    • Identity authentication
    • Identity documents
    • National IDs
  • Borders/Immig
    • Border crossings
    • Deportation
    • Border monitoring / protection
    • E-Verify
    • Border security technology
    • Illegal immigration
    • Fencing / barriers
    • Immigration and business
    • Smuggling and contraband
    • U.S. legal employment status
    • Travel documents
    • US VISIT
    • Ultralights, submersibles, tunnels
    • Visa requirements
  • Business
    • Business
    • Companies / JVs / Partnerships
    • Contracts
    • Investment trends
    • M&A
    • Market performance
    • Distribution agreements
    • Government contracts
    • Private sector contracts
    • Strategic partnerships
    • System integrators
    • Venture capital and private equity
  • Cybersecurity
    • Cloud computing
    • Corporate IT security
    • Cybercrime
    • Encryption
    • Firewalls
    • Hackers
    • Information warfare
    • Network security
    • Quantum encryption
    • Social networks
    • VPNs
  • Detection
    • Biological
    • Radiological
    • Chemical
    • Detection - nuclear, biological, chemical
    • Explosive
    • Nuclear
    • Radiological threats
    • Scanning and screening
    • Sensors and Sensor networks
  • Disasters
    • Backup / Storage systems
    • Business continuity
    • Communication interoperability
    • Compliance
    • Corporate security
    • Crisis management
    • Data recovery and management
    • Emergency management systems
    • Emergency Preparedness
    • Natural disasters
    • Risk analysis
    • Resilience / Recovery
    • Terror / Disaster insurance
  • Government
    • Africa code
    • Budget
    • Congress
    • Espionage
    • Government - federal, state, local
    • Information sharing
    • Intelligence
    • International cooperation
    • Laws and regulations
    • Nuclear weapons proliferation
    • Privacy
    • State / Local
    • Terrorism and counterterrorism
  • Infrastructure
    • Alternative energy
    • Bridges, roads, tunnels, canals
    • Chemical plants
    • Construction
    • Dams / Reservoirs
    • Energy
    • Energy policy
    • Energy resources
    • Infrastructure protection
    • Nuclear power
    • Perimeter defense and fencing
    • Power grid and stations
    • Smart grid
    • Water facilities
    • Water Technology / Treatment
  • International
    • African Security
    • Conflict
    • Culture / Religion
    • Failed states
    • Population / Migration
    • Treaties
  • Public health
    • Agroterrorism
    • BioLabs
    • Bioterrorism
    • Epidemics and pandemics
    • Food import controls
    • Food supply chain safety
    • Health standards
    • Infectious disease
    • Viruses and pathogens
    • Public health
    • Vaccines and treatments
  • Public Safety
    • Communication interoperabillity
    • Emergency services
    • Emergency medical services
    • Fire
    • First response
    • IEDs
    • Law Enforcement
    • Law Enforcement Technology
    • Military technology
    • Nonlethal weapons
    • Nuclear weapons
    • Personal protection equipment
    • Police
    • Notification /alert systems
    • Situational awareness
    • Weapons systems
  • Sci-Tech
    • Biotechnology
    • Certification and credentialing
    • Degree programs
    • Computers / software
    • Credentialing
    • Education / training
    • Engineering
    • Environment
    • Materials
    • Nanotechnology
    • National labs
    • Research and Development
    • Robotics
    • Social sciences
    • Technological innovation
  • Sector Reports
    • Biometrics
    • Border & Immigration Control
    • Cybersecurity
    • Detection
    • Emergency Management
    • Infrastructure Protection
    • Law Enforcement
    • World Report
  • Surveillance
    • Asset tracking
    • Eavesdropping
    • FISA
    • Intelligence gathering / analysis
    • Open-source searches
    • RFID technology
    • Search engines
    • Sensors and sensor networks
    • Thermal imaging
    • UAVs / Satellites / Blimps
    • Video analytics
  • Transportation
    • Air cargo / baggage
    • Aviation and Airport
    • Baggage screening
    • Cargo and Containers
    • Ground / Mass transportation
    • HAZMAT transportation
    • Maritime and Ports
    • Transportation Security
 
Advertising & Marketing: advertise@newswirepubs.com
Editorial: editor@newswirepubs.com
General: info@newswirepubs.com
2010-2011 © News Wire Publications, LLC News Wire Publications, LLC
220 Old Country Road | Suite 200 | Mineola | New York | 11501
Permissions and Policies