November 7, 2005



NEWS



Holograms organize nanowires
During the past few years scientists have gotten good at using holograms to move and manipulate microscopic objects...

DNA delivers anti-cancer drug
Nanotechnologies that tap DNA have heated up lately, especially in the drug delivery field...

Tiny sensors tracked
The continuing miniaturization of electronic devices has reached a point where tiny, inexpensive sensors scattered throughout an environment are becoming practical...

Sensors net tree data
Scientists are beginning to use networks of tiny sensors to collect data that would be impractical to gather using traditional methods...

Bits and pieces
Sorting people with common names, tracking coral reefs with neural nets, and slow light in silicon.

FEATURES

View from the High Ground:
GMU's Harry Wechsler

Pervasive computing, personalized medicine, the game of Go, biometrics, 1984, machines making decisions for us, the limits of a computer science education, and the importance of not knowing ahead of time.

How It Works: Data storage technologies
There are many possibilities for next generation data storage: very large, extraordinary and ballistic magnetoresistance; MEMS; near-field optics; holograms and molecular switches.







News RSS feed
Blog RSS feed
Bookshelf RSS feed

New: TRN's Internet Services
TRN's Jobs Center

 
SMALLEY'S
RESEARCH WATCH
November 11, 2005
Attack could overload Net
A method of exploiting the Transmission Control Protocol (TCP) could, in theory, clog large sections of the Internet, according to a report by University of Maryland researchers. The vulnerability, first uncovered six years ago, could be used to bring the world's information circulatory system to a virtual standstill, according to the report.

The CERT Coordination Center, which tracks computer and network security threats, has issued a vulnerability note about the security hole
...

November 10, 2005
Cleaner nylon

November 4, 2005
Measuring moisture

November 1, 2005
Questionable choices

 
"Look at what was done after 9/11 and recently in London. They went to find the perpetrators "after" the events and using mostly manual means. This is "state-of-the-art"...."
- Harry Weschler, George Mason University
 

  Thanks to Kevin from
GoldBamboo.com
for technical support
 

Home
     Archive     Gallery     Resources    TRN Finder     Bookshelf     Glossary

Research Directory     Events Directory      Researchers

Offline Publications     Feeds     Contribute      Under Development      T-shirts etc.      Classifieds

Forum    Comments     Feedback     About TRN     TRN Newswire and Headline Feeds for Web sites

© Copyright Technology Research News, LLC 2000-2006. All rights reserved.