Information Technology

Information Technology

The Information Security Dictionary — a compendium about the terms of IT-Security

Defining over 1,200 of the most commonly used words in the security field

The newly released Information Security Dictionary (1st Edition) (published by Springer Science) offers information security experts, systems analysts, policy makers, managers and students a reference tool to find the most commonly used terms in the field. The dictionary defines these terms in easy to understand language, provides more detail in Tables and easy cross-referencing leading the reader to related te

Information Technology

NSF Announces Two Cybersecurity Centers To Study Internet Epidemiology and "Ecology"

Centers top list of awards from NSF’s $30 million Cyber Trust program

The National Science Foundation (NSF) has announced 33 new projects from its $30 million Cyber Trust program, including two new cybersecurity research centers that will focus on eliminating plagues of Internet worms and viruses and on building better security defenses through a deeper understanding of Internet “ecology.”

“The Cyber Trust program—the centerpiece of NSF’s leadership of cybersecurity rese

Information Technology

Enhancing Mobile Tech: Predicting Phone Movements with Fuzzy Logic

Predicting the movements of mobile cell phone communications systems, thus providing a guarantee of the quality of service (QoS) and offering locating services, as well as recognising imperfect texts on a dictionary basis, are two of the applications demonstrated by José Javier Astrain Escola, engineer in the Public University of Navarre. The tool that makes this task possible is one that employs fuzzy state automatas with empty chain transitions.

At the beginning of the study, this

Information Technology

Chameleon Chip: Adaptive Microprocessor for Low Energy Use

A microprocessor adapting itself to the actual use and environment. That’s the way to keep the energy consumption of future ‘mobile companions’ within limits and be flexible at the same time. Paul Heysters, who finishes his PhD-research at the University of Twente on September 24, developed a new type of processor. His ‘Montium’ is a reconfigurable processor adapting itself towards low energy consumption. It is possible to get ten times better performance, with ten times lower energy consumption at

Information Technology

UIC unveils world’s most powerful MRI for decoding the human brain

The University of Illinois at Chicago unveiled today the world’s most powerful magnetic resonance imaging machine for human studies, capable of imaging not just the anatomy but metabolism within the brain.

This advanced technology ushers in a new age of metabolic imaging that will help researchers understand the workings of the human brain, detect diseases before their clinical signs appear, develop targeted drug therapies for illnesses like stroke and provide a better understa

Information Technology

New Camera System Enhances Victim Location in Disasters

When earthquakes strike, people often get trapped in buildings. Search and rescue teams can pinpoint some victims using sniffer dogs and sensors. But a new European system that takes pictures during or after a building collapse promises to save many more lives.

The ‘low-cost catastrophic event capturing system’ is the fruit of the IST Loccatec project. It comprises capturing devices (small, autonomous infrared cameras) and a portable central unit for the rescue teams. The cameras – p

Information Technology

Emergency ’shoelacing’ for fractured phone systems

When a major disaster–man-made or natural–takes down the phone system, who ya gonna call? No one, ’cause the phone’s dead, right? Not if you’re using a novel emergency communications system under development by the Maryland start-up TeleContinuity Inc. With initial support from the National Institute of Standards and Technology’s Advanced Technology Program (ATP), TeleContinuity is creating a “survivable” emergency telephone system back-up network that keeps individuals, compani

Information Technology

The graphical ‘Google’ for engineers

Applied Search Technology Ltd (AST) of Aston University in Birmingham, UK has announced the launch of its new software CADFind Sketch and Search – the first commercial design retrieval system in the world that can find 2D engineering drawings from a sketch.

The new software could save manufacturing companies thousands of pounds in part design by allowing the user to search, retrieve and use geometrically similar parts from their database, based on a customer drawing or a simple ske

Information Technology

IBM’s Smart DNA Stream Advances Personalized Medicine

A new technology developed by scientists at IBM could bring the promise of personalized medicine one step closer to reality.

Using a basic computer language, the researchers created a “smart” DNA stream that contains a patient’s entire medical record, according to a report in the upcoming Oct. 11 print edition of the Journal of Proteome Research, a peer-reviewed journal of the American Chemical Society, the world’s largest scientific society. The report was published online July 2

Information Technology

Handheld Tech Transforms Medical Diagnoses at Creighton U.

The use of technology in medicine takes another step forward with a program being road-tested now at Creighton University Medical Center. Several Creighton residents are using wireless-enabled handheld devices to obtain immediate access to the latest patient information at their fingertips.

Long gone are the days of reading a patient’s chart hanging on a hospital bed. For years now, doctors have checked results of patient tests on desktop computers located throughout the hospital. S

Information Technology

MDCT ’unwraps’ Egyptian mummy, clearly revealing face of 3,000 year old man

Multidetector computed tomography (MDCT) was used for the first time to produce a detailed 3D model of the face of an Egyptian man who lived nearly 3,000 years ago–without having to unwrap his mummified corpse, say a multidisciplinary group of Italian researchers that included physicians, anthropologists and forensic scientists.

MDCT was used to image the completely wrapped mummy of an artisan named Harwa, which had been on display at the Egyptian Museum in Torino, Italy. MDCT created 3D

Information Technology

Software Gaps Cost Builders $15.8 Billion in Lost Efficiency

Inadequate software interoperability in the capital facilities industry cost the commercial, institutional and industrial building sectors $15.8 billion in 2002 in lost efficiency, according to a newly released study commissioned by the National Institute of Standards and Technology (NIST).

Conducted by RTI International (Research Triangle Park, N.C.) and the Logistics Management Institute (McLean, Va.), the report places a price tag on avoidance, mitigation and delay activities due

Information Technology

Self-Configuring Mobile Terminals: The Future of Connectivity

Software Defined Radios (SDRs) are mobile devices that can be reconfigured over the air. Users could download new services from network operators, and even have voice and email services provided by different networks. The SCOUT project has studied how SDRs will be regulated and marketed.

“From the high level perspective, mobile terminal evolution will drive network evolution,” says Markus Dillinger of Siemens AG and SCOUT coordinator. “SDR Mobile terminals will evolve more and more

Information Technology

IBM Innovates Enterprise Anti-Spam Filter to Combat Email Spam

Spam is a massive problem – it currently accounts for between 1/3 and 1/2 of all emails and costs companies billions of dollars as the result of lower productivity, loss of legitimate messages and the need for increased bandwidth and storage. In a bid to try solve the problem, IBM has brought together scientists from different areas of research division to develop an enterprise anti-spam filtering system which combines several different filtering technologies to create the ultimate anti-spam syste

Information Technology

Geographers Leverage GIS Tech in War on Drugs Efforts

West Virginia’s hot, humid and rainy summer this year couldn’t have made for better conditions for the under-the-radar marijuana growers who give law enforcement fits in the Mountain State.

Authorities last year confiscated 70,000 plants, and the West Virginia State Police are predicting to at least do that in 2004.

In a state topped by hard-to-get-to mountaintops and slashed by rugged ravines and isolated valleys, the challenge isn’t always knowing where the pot is today.

Information Technology

DHS Chooses Memphis: Advancing Security Tech Nationwide

The Department of Homeland Security’s recent selection of Memphis as a “best practices” model for high-tech security measures could speed the implementation of similar technologies in other cities.

As the third of four sites to be named under DHS’ Regional Technology Integration Initiative, Memphis becomes a source of practical security “know-how,” providing technology solutions to security concerns, lessons learned and other data to help local and regional sites improve preparednes

Feedback