Defining over 1,200 of the most commonly used words in the security field
The newly released Information Security Dictionary (1st Edition) (published by Springer Science) offers information security experts, systems analysts, policy makers, managers and students a reference tool to find the most commonly used terms in the field. The dictionary defines these terms in easy to understand language, provides more detail in Tables and easy cross-referencing leading the reader to related te
Centers top list of awards from NSFs $30 million Cyber Trust program
The National Science Foundation (NSF) has announced 33 new projects from its $30 million Cyber Trust program, including two new cybersecurity research centers that will focus on eliminating plagues of Internet worms and viruses and on building better security defenses through a deeper understanding of Internet “ecology.”
“The Cyber Trust program—the centerpiece of NSF’s leadership of cybersecurity rese
Predicting the movements of mobile cell phone communications systems, thus providing a guarantee of the quality of service (QoS) and offering locating services, as well as recognising imperfect texts on a dictionary basis, are two of the applications demonstrated by José Javier Astrain Escola, engineer in the Public University of Navarre. The tool that makes this task possible is one that employs fuzzy state automatas with empty chain transitions.
At the beginning of the study, this
A microprocessor adapting itself to the actual use and environment. That’s the way to keep the energy consumption of future ‘mobile companions’ within limits and be flexible at the same time. Paul Heysters, who finishes his PhD-research at the University of Twente on September 24, developed a new type of processor. His ‘Montium’ is a reconfigurable processor adapting itself towards low energy consumption. It is possible to get ten times better performance, with ten times lower energy consumption at
The University of Illinois at Chicago unveiled today the worlds most powerful magnetic resonance imaging machine for human studies, capable of imaging not just the anatomy but metabolism within the brain.
This advanced technology ushers in a new age of metabolic imaging that will help researchers understand the workings of the human brain, detect diseases before their clinical signs appear, develop targeted drug therapies for illnesses like stroke and provide a better understa
When earthquakes strike, people often get trapped in buildings. Search and rescue teams can pinpoint some victims using sniffer dogs and sensors. But a new European system that takes pictures during or after a building collapse promises to save many more lives.
The ‘low-cost catastrophic event capturing system’ is the fruit of the IST Loccatec project. It comprises capturing devices (small, autonomous infrared cameras) and a portable central unit for the rescue teams. The cameras – p
When a major disaster–man-made or natural–takes down the phone system, who ya gonna call? No one, cause the phones dead, right? Not if youre using a novel emergency communications system under development by the Maryland start-up TeleContinuity Inc. With initial support from the National Institute of Standards and Technologys Advanced Technology Program (ATP), TeleContinuity is creating a “survivable” emergency telephone system back-up network that keeps individuals, compani
Applied Search Technology Ltd (AST) of Aston University in Birmingham, UK has announced the launch of its new software CADFind Sketch and Search – the first commercial design retrieval system in the world that can find 2D engineering drawings from a sketch.
The new software could save manufacturing companies thousands of pounds in part design by allowing the user to search, retrieve and use geometrically similar parts from their database, based on a customer drawing or a simple ske
A new technology developed by scientists at IBM could bring the promise of personalized medicine one step closer to reality.
Using a basic computer language, the researchers created a “smart” DNA stream that contains a patient’s entire medical record, according to a report in the upcoming Oct. 11 print edition of the Journal of Proteome Research, a peer-reviewed journal of the American Chemical Society, the world’s largest scientific society. The report was published online July 2
The use of technology in medicine takes another step forward with a program being road-tested now at Creighton University Medical Center. Several Creighton residents are using wireless-enabled handheld devices to obtain immediate access to the latest patient information at their fingertips.
Long gone are the days of reading a patient’s chart hanging on a hospital bed. For years now, doctors have checked results of patient tests on desktop computers located throughout the hospital. S
Multidetector computed tomography (MDCT) was used for the first time to produce a detailed 3D model of the face of an Egyptian man who lived nearly 3,000 years ago–without having to unwrap his mummified corpse, say a multidisciplinary group of Italian researchers that included physicians, anthropologists and forensic scientists.
MDCT was used to image the completely wrapped mummy of an artisan named Harwa, which had been on display at the Egyptian Museum in Torino, Italy. MDCT created 3D
Inadequate software interoperability in the capital facilities industry cost the commercial, institutional and industrial building sectors $15.8 billion in 2002 in lost efficiency, according to a newly released study commissioned by the National Institute of Standards and Technology (NIST).
Conducted by RTI International (Research Triangle Park, N.C.) and the Logistics Management Institute (McLean, Va.), the report places a price tag on avoidance, mitigation and delay activities due
Software Defined Radios (SDRs) are mobile devices that can be reconfigured over the air. Users could download new services from network operators, and even have voice and email services provided by different networks. The SCOUT project has studied how SDRs will be regulated and marketed.
“From the high level perspective, mobile terminal evolution will drive network evolution,” says Markus Dillinger of Siemens AG and SCOUT coordinator. “SDR Mobile terminals will evolve more and more
Spam is a massive problem – it currently accounts for between 1/3 and 1/2 of all emails and costs companies billions of dollars as the result of lower productivity, loss of legitimate messages and the need for increased bandwidth and storage. In a bid to try solve the problem, IBM has brought together scientists from different areas of research division to develop an enterprise anti-spam filtering system which combines several different filtering technologies to create the ultimate anti-spam syste
West Virginia’s hot, humid and rainy summer this year couldn’t have made for better conditions for the under-the-radar marijuana growers who give law enforcement fits in the Mountain State.
Authorities last year confiscated 70,000 plants, and the West Virginia State Police are predicting to at least do that in 2004.
In a state topped by hard-to-get-to mountaintops and slashed by rugged ravines and isolated valleys, the challenge isn’t always knowing where the pot is today.
The Department of Homeland Security’s recent selection of Memphis as a “best practices” model for high-tech security measures could speed the implementation of similar technologies in other cities.
As the third of four sites to be named under DHS’ Regional Technology Integration Initiative, Memphis becomes a source of practical security “know-how,” providing technology solutions to security concerns, lessons learned and other data to help local and regional sites improve preparednes