Big data studies often use easily available user-generated data from the Internet. Researchers assume that this data offers a window into reality. It doesn’t necessarily.
Humidity levels can mean life or death for insects.
Hasna Lahmini
Detecting drier or wetter conditions is crucial for insect survival. We’ve long known they can do this – now researchers have discovered the genetic and neural basis for their humidity-sensing system.
Police tap into social media to do their job.
Carlo Allegri/Reuters
Government agencies are turning to social media as a new way to engage with their constituencies. Practitioners in the trenches are excited about the possibilities – while some academics are less so.
Who owns your thoughts? And other important questions raised by technology.
Hands and brain via shutterstock.com
New and imagined digital technologies have important ethical implications. We should devise relevant social norms through a high-profile, public, collaborative process.
Fitness trackers make activity into a contest.
Wearable image via www.shutterstock.com.
The human psyche loves a challenge as well as a pat on the back for achievement. Pervasive computing taps into these drives to ‘gamify’ aspects of life that are typically not games or even much fun.
We’re on the hunt for life – what do we do when we find it?
NASA/JPL-Caltech/MSSS
Richard Forno, University of Maryland, Baltimore County and Anupam Joshi, University of Maryland, Baltimore County
The country’s actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
A common sight: smartphones at mealtime.
Phones at dinner via shutterstock.com
Anecdotal evidence suggests the pervasiveness of smartphones is making us increasingly distracted and hyperactive. Does research support that conclusion?
Criminals who hide their computers shouldn’t go free.
Computer criminal via shutterstock.com
Fall in love, have a baby, watch your happiness and satisfaction plummet. Psychology researchers know the transition to parenthood can be rough on relationships.
Gah! What did I just do?!?!
Image of hands and computer via shutterstock.com
Scientists of all kinds turn to computer models to investigate questions they can’t get at any other way. Here’s how models work and why we can trust them.
The attacker may already be inside.
Computer user image via shutterstock.com
We don’t need to look for Earth-like planets exclusively around Sun-like stars. Tiny, dim TRAPPIST-1 has only 11 percent the diameter of the Sun and is much redder.
One balloting machine for all voters: universal design is accessible for everyone, with or without disabilities.
University of Florida
In 2012, nearly one-third of voters with a disability had trouble voting. A 2002 law was supposed to fix this problem. New technology may have the answer at last.
Aedes aegypti mosquitoes are at the center of Zika virus’ spread.
Jaime Saldarriaga/Reuters
Look beyond transgenic techniques that add new genes to a species. People have used selective breeding techniques to change plants and animals for millennia – why not try them on mosquitoes?
If we’re super-wired in the future, will we also be super-vulnerable?
keoni101/flickr
Throwaway phones are just one piece of the ever-widening technological arsenal of extremists and terror groups of all kinds.
Nano-architects design materials that can work together at very tiny scales, like these interlocking gears made of carbon tubes and benzene molecules.
NASA
One of the great technological challenges of this century is to design novel items and then make them – and have the results match the intent.
After one reactor at the Chernobyl nuclear power plant caught fire and exploded in 1986, the whole site was encased in a concrete sarcophagus.
Vladimir Repik/Reuters
The meltdown at the Chernobyl Nuclear Power Plant in 1986 exposed 572 million people to radiation. No other nuclear accident holds a candle to that level of public health impact.
Your phone’s just sitting there, innocently….
Tabletop image via www.shutterstock.com.
Bad guys or law enforcement could hack into our networked gadgets to spy on everything we do – and it’s not clear how a laptop’s video camera or an Amazon Echo fits within wiretapping laws.
In scientific research, repetition is good.
w4nd3rl0st/flickr
Gifted musician, peerless showman – and fierce protector of his copyrighted work. Prince fought battles that changed the direction of the music industry and are helping the next generation of artists.