• Energy from vortices

    When water flows over an underwater obstacle, whirlpools or vortices form alternately above and below it; the vortices create a tugging effect, so the result is an alternating force that yanks the object up and down; Wolverines researchers want to harness the power of vortices to generate energy

  • New technology allows for better communication on the battlefield

    Multi-User Detection technology allows radios to transmit at the same time while sharing the same frequency; MUD allows more traffic on various networking systems, which is an advantage to military personnel with critical need for high throughput air-to-air, air-to-ground, and soldier-to-soldier communications

  • USGS says Bakken Formation holds large recoverable oil, gas reserves

    U.S. Geological Survey assesses Bakken Formation to Hold 3 to 4.3 billion barrels of technically recoverable oil — 25 times more than 1995 estimate; in addition, assessment also identified 1.85 trillion cubic feet of associated/dissolved natural gas, and 148 million barrels of natural gas liquids

  • Stolen military items available for sale online

    GAO investigators buy dozens of prohibited military items on eBay and Craigslist; some of the time would be of direct help to terrorists and insurgents

  • UK Biometrics offers new finger print reader

    Newcastle-based biometric company introduces its Evolution product; company says Evolution can scan one million records per second

  • New way to estimate size and frequency of meteorite impacts

    How large was the meteorite which hit Earth 65 million years ago, leading to the extinction of the dinosaurs? Now we know: Four to six kilometers in diameter; scientists offer new methods to measure the size and frequency of meteorite impact

  • New methods for detecting IEDs

    Improvised explosive devices (IEDs) have exerted a painful toll on coalition forces in Iraq, and now in Afghanistan; DHS is worried that IEDs will soon make their deadly appearance on U.S. soil; Wolverines researchers offer a novel methods for detecting IEDs

  • Simulating hurricanes to test buildings' resilience

    Researchers built a system of “blower boxes” which exert pressure on buildings similar to the buffeting of winds from gusts exceeding 250 kilometers per hour; the goal is to find ways to construct sturdier, more resilient structures

  • One VC's view: "Water is the next oil"

    VC hopes to capitalize on an increasingly scarce resource

  • Armed robots pulled out of Iraq

    Last August, three gun-totting robots were deployed to Iraq — the first such deployment in military history; the armed robots had a short career as soldiers, though: For reasons yet to be determined, the robots kept training their guns on their operators; no shots were fired, but the military decided more work was required

  • Clean Diesel licenses WMF technology to China's Headway

    The U.S. EPA gave Clean Diesel’s Wire Mesh Filter technology high marks, and China needs it: At the beginning of the year it signed up to the Euro IV PM emission standards for light and medium duty trucks; a clean diesel technology will allow it to meet the treaty’s standards

  • EU selects Symantec for WOMBAT project

    WOMBAT aims to provide new means for understanding the existing and emerging threats which are targeting the Internet economy and its users; EU selects Symantec to do research for the project

  • Lockheed Martin in £100 million U.K. situational awareness contract

    Lockheed Martin will merge several technologies — its own and other companies’ — in a £100 million MoD contract to increase soldiers’ situational awareness

  • MIT start-up raises $12.4 million in a first round

    Start-up has developed an innovative silicon cell architecture and a complementary manufacturing methodology which will allow it to make the solar cells so inexpensive that they would produce electricity at a comparable cost to that generated from coal powered stations

  • CoreStreet's new access control technology making news

    CoreStreet’s Card-Connected technology creates a system of stand-alone electronic locks and physical access control systems which communicate by reading and writing digitally signed data (privileges and logs) to and from smart cards; card holders thus become an extension of the physical access network in which cards, rather than of wires, carry information to and from the standalone locks