-
Using building “belt” cheaply, quickly to repair of earthquake damage
Four years after the January 2010 earthquake, 145,000 people still remain homeless in Haiti. Researchers developed a cheap and simple technology to repair earthquake damaged buildings to help to reduce these delays by quickly making buildings safe and habitable. The technology involves wrapping metal straps around each floor of the building, which are then tensioned either by hand or using compressed air tools. Unlike other repair methods, it does not require expensive materials or a high level of technical knowledge, making it ideal for use in the developing world.
-
-
Palo Alto Networks acquires Morta Security
Palo Alto Networks has acquired Morta Security, a Silicon Valley-based cybersecurity company operating in stealth mode since 2012. Financial terms of the acquisition were not disclosed. Palo Alto Networks says that the acquisition of Morta Security further strengthens its position as a provider of next-generation enterprise security.Palo Alto Network says that most organizations still rely on legacy point technologies that address only specific types of attacks, or phases of the attack. Because of the singular nature of these technologies, they are ill-equipped to detect and prevent today’s advanced cyberattacks.The company says that to address these challenges, a new approach is required.
-
-
Bringing anthropological insights to bear on cybersecurity
Michael Polanyi (1891-1976), in his book Personal Knowledge, rejected the British Empiricists’ notion that experience can be reduced to sense data, and Alan Turing’s assertion that human minds are reducible to collections of rules. Rather, Polanyi said, it is tacit awareness — he later called it the “structure of tacit knowing”— which connects us, albeit fallibly, with reality. It provides us with the context within which our words and actions have meaning. Princeton’s anthropologist Clifford Geertz (1926-2006), in his The Interpretation of Cultures, built on Polanyi’s argument to say that the task of ethnography is thus to discover and interpret the secondary, or underlying (Polnayi would say “tacit”) meanings of social behavior — the “deep structure” of culture and social life. Cybersecurity experts at Kansas State University, in a 3-year, $700,000 project, take an anthropological approach to cybersecurity: they are examining the unspoken knowledge shared by cybersecurity analysts as a way to develop new automated tools that help analysts strengthen their cyberdefenses.
-
-
2013 natural catastrophes dominated by extreme weather in Europe, Supertyphoon Haiyan
Exceptionally high losses from weather-related catastrophes in Europe and Supertyphoon Haiyan dominated the overall picture of natural catastrophes in 2013. Floods and hailstorms caused double-digit billion-dollar losses in central Europe, and in the Philippines one of the strongest cyclones in history, Supertyphoon Haiyan, resulted in a human catastrophe with over 6,000 fatalities.
-
-
Abandoned mine offers clues about permanent CO2 sequestration
Power plants and other industries are responsible for more than 60 percent of global CO2 emissions, according to the International Energy Agency. Sequestering the CO2 in magnesite deposits would prevent the gas from entering the atmosphere and warming the planet. Stanford University researchers, studyingveins of pure magnesium carbonate, or magnesite — a chalky mineral made of carbon dioxide (CO2) and magnesium – in an abandoned mine in the Red Mountain, propose a novel technique for converting CO2 into solid magnesite, making CO2 sequestration feasible.
-
-
NIST invites comment on RFP to support cybersecurity center of excellence
The National Cybersecurity Center of Excellence (NCCoE) is inviting comments on a Partial Draft Request for Proposals (RFP) for a contractor to operate a Federally Funded Research and Development Center (FFRDC) to support the mission of the NCCoE. The FFRDC will be the first solely dedicated to enhancing the security of the nation’s information systems.
-
-
Relying on geoengineering to reduce climate change unlikely to succeed
Reducing the amount of sunlight reaching the planet’s surface by geoengineering may not undo climate change after all. Researchers used a simple energy balance analysis to explain how the Earth’s water cycle responds differently to heating by sunlight than it does to warming due to a stronger atmospheric greenhouse effect. Further, they show that this difference implies that reflecting sunlight to reduce temperatures may have unwanted effects on the Earth’s rainfall patterns.
-
-
NASA going asteroid hunting
The NASA Asteroid Robotic Retrieval Mission concept involves the capture of an asteroid, and dragging it onto a new trajectory that traps it in the Earth–Moon system where it will be further investigated by astronauts. The current mission design requires the target asteroid to have a diameter of seven to ten meters.
-
-
Scientists predicted size, location of 2012 Costa Rica earthquake
The Nicoya Peninsula in Costa Rica is one of the few places where land sits atop the portion of a subduction zone where the Earth’s greatest earthquakes take place. Costa Rica’s location therefore makes it the perfect spot for learning how large earthquakes rupture. Because earthquakes greater than about magnitude 7.5 have occurred in this region roughly every fifty years, with the previous event striking in 1950, scientists have been preparing for this earthquake through a number of geophysical studies. The most recent study used GPS to map out the area along the fault storing energy for release in a large earthquake. The study accurately forecasted the size and location of the magnitude 7.6 Nicoya earthquake that occurred in 2012 in Costa Rica.
-
-
Curbing climate change requires more attention to livestock
While climate change negotiators struggle to agree on ways to reduce carbon dioxide (CO2) emissions, they have paid inadequate attention to other greenhouse gases associated with livestock. Researchers say that cutting releases of methane and nitrous oxide, two gases that pound-for-pound trap more heat than does CO2, should be considered alongside the challenge of reducing fossil fuel use. Ruminant livestock (cattle, sheep, goats, and buffalo) produce copious amounts of methane in their digestive systems. CO2 is the most abundant greenhouse gas, but the international community could achieve a more rapid reduction in the causes of global warming by lowering methane emissions through a reduction in the number of ruminants, the researchers say, than by cutting CO2 alone.
-
-
Barrier systems, robots reduce security costs
High-security compounds have traditionally employed security guards to protect buildings and facilities, deter intrusion, and prevent theft, but as budget cuts continue to force both private and government organizations to cut staff, some agencies are deploying portable barrier systems and robots tasked with securing organizations and their assets.
-
-
Sea level rise, shoreline changes leading influences on flooding from hurricanes
Recent studies into coastal flooding have focused on climate change impacts on the intensity and frequency of tropical cyclones themselves, but researchers say that two other factors contribute even more to the growing threats to coastal communities: sea level rise and shoreline retreat. Researchers highlight sea level rise and its potential dramatically to change the coastal landscape through shoreline erosion and barrier island degradation, and say that it is an under-appreciated and understudied factor that could lead to catastrophic changes in flood risk associated with tropical cyclones, known as hurricanes in the North Atlantic.
-
-
Asteroid hunter spacecraft returns first images after reactivation
In 2010 and early 2011, NASA’s Near-Earth Object Wide-field Infrared Survey Explorer (NEOWISE), a spacecraft that made the most comprehensive survey to date of asteroids and comets, discovered more than 34,000 asteroids and characterized 158,000 throughout the solar system. It was reactivated in September following thirty-one months in hibernation, to assist NASA’s efforts to identify the population of potentially hazardous near-Earth objects (NEOs).
-
-
NERC’s critical infrastructure protection standards ambiguous, unclear: analysts
In January 2008, to counter cybersecurity threats to critical infrastructure assets such as bulk electricity supply (BES), North American Electric Reliability Corp.’s (NERC) launched its Critical Infrastructure Protection (CIP) standards for BES cybersecurity. The NERC-CIP is marked by uncertainties and ambiguous language, raising concerns in the industry and among industry observers as companies try to enforce the standards. “Industry now screams for a defined control set with very specific requirements that don’t permit subjective and ambiguous interpretations,” comments one analyst.
-
-
2014 Cybersecurity Forum to focus on Trusted Computing
The 2014 Cybersecurity Innovation Forum, to be held 28-30 January 2014, at the Baltimore Convention Center in Baltimore, Maryland, will focus on the existing threat landscape and provide presentations and keynotes on current and emerging practices, technologies and standards to protect the nation’s infrastructure, citizens and economic interests from cyberattack.
-
More headlines
The long view
Helping Strengthen America’s Critical Infrastructure
Everyday life depends on a robust infrastructure network that provides access to running water, communications technology and electricity, among other basic necessities. The experts who keep our national infrastructure secure and resilient also need a strong network to share their knowledge and train the next generation of professionals capable of solving complex infrastructure challenges.
AI and the Future of the U.S. Electric Grid
Despite its age, the U.S. electric grid remains one of the great workhorses of modern life. Whether it can maintain that performance over the next few years may determine how well the U.S. competes in an AI-driven world.