Most of today’s computer languages make it hard for programmers to protect users’ privacy and security. The fix is to take those tasks out of human hands entirely.
An insider can bypass many layers of security.
Los Alamos National Laboratory
Basic safeguards are not enough to protect against insider threats. It requires rethinking how to overcome the biases that cause us to dismiss the danger.
Well hello, Dolly.
Photo courtesy of The Roslin Institute, The University of Edinburgh.
In 1997, scientists announced they’d created a healthy sheep cloned from another ewe’s mammary gland cell. Two decades on, the technique is being refined and applied to new challenges.
More Dollies, cloned from the same cell line.
Courtesy of Kevin Sinclair, University of Nottingham
Students with chronic illness often get only a few hours of education a week. Telepresence robots could let them participate fully in classroom and school activities.
A New York Times article from 1910 describes founding of Mound Bayou, a town founded on the wealth of a steamboat patent.
SundayMagazine.org
American slaves couldn’t hold property – including patents on their own inventions. But that didn’t stop black Americans from innovating since the beginning of the country’s history.
Digital information should be private and secure.
Digital communications via shutterstock.com
Recent developments at the United Nations and the G-20 suggest that the well-known human rights to privacy and freedom of expression may soon be formally extended to online communications.
Looking for a lifelong Valentine? Psychologists suggest taking a closer look at your best friend. The things we want in a good friend are many of the same things we expect from a romantic partner.
Pardon me while I blow this out of proportion.
Blowfish image via www.shutterstock.com.
Laser-like focus on a tiny, unimportant detail can mean you miss the gorilla in the room – a tactic climate change deniers use to cast doubt on the science.
Allison Davis, circa 1965.
Courtesy of the Davis family.
You might think you’re anonymous when you’re browsing the web. But a new study shows that browsing history can often be tied to your real-world identity.
When scientists stand up, do they lose standing?
Liz Lemon
In the wake of the Flint water crisis and with a new notably anti-science president, U.S. scientists are reevaluating how to navigate the tension between speaking out and a fear of losing research funding.
Are we headed to a magnetic reversal and all the global disruption that would bring? Enter archaeomagnetism. A look at the archaeological record in southern Africa provides some clues.
It’s not always obvious where a new technology will end up.
NIH Image Gallery
A scientific breakthrough in a vacuum may be free of ethical implications. But many developments can be used for good or evil, or both. There’s a fine balance on what to control and to what extent.
Looking deep into computer activities.
Via shutterstock.com
Cyberdetectives look for digital doors or windows left unlocked, find electronic footprints in the dirt and examine malicious software for clues about who broke in, what they took and why.
John Carrier, Massachusetts Institute of Technology (MIT)
The problems that cause us to be so frustrated we contemplate throwing a computer can be much more serious than a multimillionaire football coach having a minor tantrum on a Sunday afternoon.
Gotcha, five times faster than the blink of an eye.
Candler Hobbs/Georgia Tech
Alexis Noel, Georgia Institute of Technology and David Hu, Georgia Institute of Technology
How do a frog’s tongue and saliva work together to be sticky enough to lift 1.4 times the animal’s body weight? Painstaking lab work found their spit switches between two distinct phases to nab prey.
The cybersecurity industry needs more trained workers.
Students via shutterstock.com
Governments, academic institutions and private companies are all spending millions of dollars. But the most effective solutions to the cybersecurity labor shortage will not be found individually.
An NVIDIA-powered Audi needs no driver.
AP Photo/John Locher
Together, three recent events mark a crucial turning point in the development of autonomous cars: They are both safer and more advanced than ever before.
Tiny CubeSats are ready to be our eyes in the skies.
Earth Background: NASA; HARP Spacecraft: SDL; Montage: Martins, UMBC
As technology advances, tiny satellites no bigger than a loaf of bread have advanced from just proving they work to being big contributors in answering science questions.
Get a taste of a drone-enabled future by looking at innovations and explorations from researchers, students and employees at one of the nation’s largest university systems.
The darknet, like the open internet, is not immune from illegal activity. But many darknet users are there in search of ‘hacker ethics’ values such as privacy and free speech.
Donald Trump is famously attached to his phone.
AP Photo/Matt Rourke
Anupam Joshi, University of Maryland, Baltimore County
The best way to protect a presidential device is to keep it off the internet altogether. If that’s not going to happen, how else can such a sensitive gadget be kept safe?