As smartphones, tablets, smart TVs and other smart devices become more prevalent in our lives, computer scientists have raised concerns that these network-enabled devices, if not properly secured, could be co-opted to…
Category: Technology
Defeating Cyberattacks on 3D Printers
Rutgers University and Georgia Tech engineers have devised three ways to combat cyberattacks on 3-D printers: monitoring printer motion and sounds and using tiny gold nanoparticles. 3D Printers will be attractive targets…
MIT’s Case study suggests new approach to urban water supply
Researchers have found there is often a strong case for building relatively modest, incremental additions to water infrastructure in advanced countries, rather than expensive larger-scale projects that may be needed only rarely….
Automated fingerprint analysis is one step closer to reality
Scientists have developed an algorithm that automates a key step in forensic fingerprint analysis, which may make the process more reliable and efficient. The first big case involving fingerprint evidence in the…
Microsoft announces Coco Framework to facilitate businesses looking to adopt blockchain technology
Blockchain is a transformational technology with the potential to extend digital transformation beyond a company’s four walls and into the processes it shares with suppliers, customers and partners. A growing number of…