|
NEWS
|
|
|
Holograms
organize nanowires
During the past few years scientists have gotten
good at using holograms to move and manipulate microscopic
objects...
|
DNA
delivers anti-cancer drug
Nanotechnologies that tap DNA have heated up lately,
especially in the drug delivery field...
|
Tiny
sensors tracked
The continuing miniaturization of electronic devices
has reached a point where tiny, inexpensive sensors scattered
throughout an environment are becoming practical...
|
Sensors
net tree data
Scientists are beginning to use networks of tiny
sensors to collect data that would be impractical to gather
using traditional methods...
|
Bits
and pieces
Sorting people with common names, tracking coral reefs
with neural nets, and slow light in silicon.
|
FEATURES
|
View
from the High Ground:
GMU's Harry Wechsler
Pervasive computing, personalized medicine,
the game of Go, biometrics, 1984, machines making decisions
for us, the limits of a computer science education, and
the importance of not knowing ahead of time.
|
How
It Works: Data storage technologies
There are many possibilities for next generation
data storage: very large, extraordinary and ballistic
magnetoresistance; MEMS; near-field optics; holograms
and molecular switches. |
|
|
News RSS feed
Blog RSS feed
Bookshelf RSS feed
New: TRN's
Internet Services
TRN's Jobs Center
|
|
SMALLEY'S
RESEARCH WATCH |
November
11, 2005 |
Attack
could overload Net
A method of exploiting
the Transmission Control Protocol (TCP) could,
in theory, clog large sections of the Internet,
according to a report by University of Maryland
researchers. The vulnerability, first uncovered
six years ago, could be used to bring the
world's information circulatory system to
a virtual standstill, according to the report.
The CERT Coordination Center, which
tracks computer and network security threats,
has issued a vulnerability note about the
security hole...
November
10, 2005
Cleaner
nylon
November
4, 2005
Measuring
moisture
November 1, 2005
Questionable
choices |
|
|
|
"Look
at what was done after 9/11 and recently in London.
They went to find the perpetrators "after"
the events and using mostly manual means. This is
"state-of-the-art"...."
- Harry Weschler, George Mason University |
|
|
|
|
Thanks
to Kevin from
GoldBamboo.com
for technical support |
|