-
Using visualization to see through fuzzy data
Finding method in the madness: DHS’s S&T Directorate supports efforts, building on Edward Tufte’s work, to use visualization to find patterns in and make sense of fuzzy data
-
-
Carbon fiber UAV sets flight duration record
QinetiQ Group’s Zephyr breaks record for the longest duration unmanned flight — 54 hours — nearly doubling Northrop Grumman’s RQ-4A Global Hawk 2001 record of 30 hours, 24 minutes
-
-
More opposition in Europe to Galileo
Growing opposition in Europe to the Galileo Project, Europe’s response to the U.S. GPS network; behind schedule and over budget, many ask whether the benefits of the system would outweigh its costs
-
-
Octopus inspire new camouflage strategies for military applications
New in personal protection equipment: The remarkable shape- and color-changing abilities of the octopus and its close relatives inspire researchers to attempt to understand one of nature’s most stunning feats of camouflage and self-preservation — and see whether such techniques can be applied in the military
-
-
Plasma antennas are stealthy, versatile, and jam resistant
Soldiers in the field would soon benefit from a new antenna made of plasma — that is, a gas heated to the point at which the electrons are ripped free of atoms and molecules) works just like conventional metal antennas, except that it vanishes when you turn it off
-
-
D-Wave demonstrates quantum computer with Google image search
This week in Reno, Nevada, D-Wave demonstrates the first commercial quantum computer by using Google’s forthcoming search-by-image tool; problems remain
-
-
Chinese intelligence engages in industrial spying in Europe
China may be slowly integrating into the global economy, but its massive disregard of intellectual property laws shows that it has yet to internalize important norms of market conduct; and now this: Chinese intelligence is using its considerable assets to engage in industrial spying on behalf of Chinese companies
-
-
FLIR expanding Gulf presence
FLIR’s sensor technology, used in border protection and perimeter defense, among other applications, has won the company several hefty contracts in the Gulf region; company eager to build on its success
-
-
U.S. gives Israel $155 million for missile defense system
Congressional committee approved $155 million for Israel’s two missile defense systems — the Arrow for high-altitude missile and David’s Sling for short-range rockets; sum more than doubles what the administration had in mind
-
-
Quantum computers near: Scientists rotate electron spin with electric field
Researchers succeed in controlling the spin of a single electron merely by using electric fields; this clears the way for a much simpler realization of the building blocks of a (as yet theoretical) super-fast quantum computer
-
-
Canberra cancelled robot IED detection system in 2004
Aussie soldiers in Afghanistan are just as exposed to IEDs as U.S. soldiers; in 2004 the Australian government canceled a project aimed to detect IEDs, and Australians want to know why
-
-
NIST shows tiny sensor with biomedical, homeland security applications
Tiny sensor can detect magnetic field changes as small as 70 femtoteslas — equivalent to the brain waves of a person daydreaming; in addition to medical uses, sensor may be deployed in airport screening for explosives based on detection of nuclear quadrupole resonance in nitrogen compounds
-
-
Going beyond Moore’s Law
Moore’s law states that the number of transistors in a microchip doubles every two years, but this is just not fast enough for current innovation; European researchers stack several functional chips into a single, extremely small, package
-
-
Ensuring imports' safety offers lucrative business opportunities
Mounting worries about hazardous substances in food, toys, and other consumer goods is creating opportunities for makers of devices which detect such dangers; Bay State businesses seize opportunities
-
-
Private equity firms focus on India's clean technology sector
Several PE firms allocate investments in India’s clean technology sector from their general funds, but others create India-only funds to focus on the sector even more
-
More headlines
The long view
A Shining Star in a Contentious Legacy: Could Marty Makary Be the Saving Grace of a Divisive Presidency?
While much of the Trump administration has sparked controversy, the FDA’s consumer-first reforms may be remembered as its brightest legacy. From AI-driven drug reviews to bans on artificial dyes, the FDA’s agenda resonates with the public in ways few Trump-era policies have.
Risk Assessment with Machine Learning
Researchers utilize geological survey data and machine learning algorithms for accurately predicting liquefaction risk in earthquake-prone areas.
Foundation for U.S. Breakthroughs Feels Shakier to Researchers
With each dollar of its grants, the National Institutes of Health —the world’s largest funder of biomedical research —generates, on average, $2.56 worth of economic activity across all 50 states. NIH grants also support more than 400,000 U.S. jobs, and have been a central force in establishing the country’s dominance in medical research. Waves of funding cuts and grant terminations under the second Trump administration are a threat to the U.S. status as driver of scientific progress, and to the nation’s economy.
The True Cost of Abandoning Science
“We now face a choice: to remain at the vanguard of scientific inquiry through sound investment, or to cede our leadership and watch others answer the big questions that have confounded humanity for millennia —and reap the rewards.”
Bookshelf: Smartphones Shape War in Hyperconnected World
The smartphone is helping to shape the conduct and representation of contemporary war. A new book argues that as an operative device, the smartphone is now “being used as a central weapon of war.”
New Approach Detects Adversarial Attacks in Multimodal AI Systems
New vulnerabilities have emerged with the rapid advancement and adoption of multimodal foundational AI models, significantly expanding the potential for cybersecurity attacks. Topological signatures key to revealing attacks, identifying origins of threats.