Researchers at TU Darmstadt halt individual photons and can release them at the push of a button. The tool could be used for bug-proof communications, for example, or for something that was previously impossible. A recent paper on their work was published in ;Optics Express'.
A Purdue team created a technology called OPTIMUSCLOUD -- which is designed to help achieve cost and performance efficiency for cloud-hosted databases.
A new study provides new details of a technique that could have allowed a relatively small number of computers to carry out DDoS (distributed denial of service) attacks on a massive scale, overwhelming targets with false requests for information until they were thrown offline.
Ring, Nest, SimpliSafe and eight other manufacturers of internet-connected doorbell and security cameras have been alerted to "systemic design flaws" discovered by Florida Tech computer science student Blake Janes that allow a shared account that appears to have been removed to actually remain in place with continued access to the video feed.
Using biologically inspired robotic swarms consisting of large groups of robots that have been programmed to operate cooperatively, much like individuals in an ant or bee colony, scientists from the University of Colorado demonstrate that the locally observed distribution of robots can be correlated to the location of environmental features, such as exits in office-like environments. The study's findings were published in IEEE/CAA Journal of Automatica Sinica.
Engineers have demonstrated a method for ensuring that an increasingly popular method of genetic identification called "DNA fingerprinting" remains secure against inadvertent mistakes or malicious attacks in the field. The technique relies on introducing genetic "barcodes" to DNA samples as they are collected and securely sending information crucial to identifying these barcodes to technicians in the laboratory.
We believe we are less likely than others are to fall for phishing scams, thereby underestimating our own exposure to risk, a new cybersecurity study has found.
Threat detection and prevention are essential to ensuring the safety and security of warfighters. Researchers have developed a way to speed up the processing of extremely large graphs and data, making the most efficient use of modern Army computational resources before and during Soldier deployment.
Women are underrepresented in leadership positions throughout the information technology industry. While more and more women are earning degrees in science, technology, engineering, and math -- or STEM -- fields, they don't necessarily pursue careers in IT, because they don't see opportunities for growth. New research from the Lally School of Management at Rensselaer Polytechnic Institute published in Information Systems Research examines how gender affects the likelihood of promotions in the context of the IT industry.
Social media bots are continuously evolving and becoming more 'human-like' in the way they talk and interact on online platforms. Previous research has focused on bot detection, but little attention has been devoted to the characterization and measurement of the behavior and activity of bots, compared to humans. In this study, researchers have revealed distinct behavioral differences between human and bot activity on social media which could be leveraged to improve bot detection strategies.