Oct 22, 2019
Oct 22, 2019
It is hard to get people excited about software, says Eliza Grames, a doctoral candidate in ecology and evolutionary biology. Yet, the software she has developed is exciting for anyone about to embark on a new research and ...
Sep 05, 2019
If every turn of the wheel is a revolution, then every sweep of a wind turbine blade is an opportunity. That's how researchers at the National Renewable Energy Laboratory (NREL) view the potential for wind plant operators ...
Aug 21, 2019
Hydrogen will play a key role in reducing our dependence on fossil fuels. It can be sustainably produced by using solar energy to split water molecules. The resulting clean energy can be stored, used to fuel cars or converted ...
Apr 30, 2019
A new, free, open-source software reliably predicts how damage from hurricanes, ice storms, earthquakes, and other extreme events will restrict power delivery from utility grids. The Severe Contingency Solver for Electric ...
Apr 09, 2019
In the future, robots could play a key role in healthcare settings, easing the lives of the elderly and assisting vulnerable individuals. Researchers at Imperial College London have recently created Robot DE NIRO, a robotics ...
Nov 09, 2018 feature
Imagine you had a secret document you had to store away from prying eyes. And you have a choice: You could buy a safe made by a company that kept the workings of its locks secret. Or you could buy a safe whose manufacturer ...
Oct 17, 2018
The non-aggression patent community can put a new feather in its cap, calling out that Microsoft has joined OIN. Shawn Knight in TechSpot: "On Wednesday, it was announced that the Redmond-based technology giant had joined ...
Oct 12, 2018 weblog
A team of researchers have developed an open-source, clinically validated template for a 3D printed stethoscope for use in areas of the world with limited access to medical supplies - places where a stethoscope could mean ...
Mar 14, 2018
(Tech Xplore)—"Many of the algorithms used in cryptography for encryption, decryption, and authentication are complicated, especially when asymmetric, public key cryptography is being used," said Peter Bright on Monday ...
Dec 21, 2016 weblog