Software

Protection against terrorist attacks with homemade explosives

Terrorist attacks often feature the use of homemade explosives. For the police and security forces to be able to take appropriate precautions and assess the damage after an attack, they need access to the right kind of tools. ...

Consumer & Gadgets

Can wearables like Fitbit devices be used to help detect COVID-19?

The researchers, funded by National Institute for Health Research (NIHR) Maudsley Biomedical Research Centre (BRC), created the Mass Science app that allows COVID-Collab study participants to connect wearables, such as Fitbit ...

Software

Blueprint for the perfect coronavirus app

Many countries are turning to digital aids to help manage the COVID-19 pandemic. ETH researchers are now pointing out the ethical challenges, that need to be taken into account and the issues that need careful consideration ...

Energy & Green Tech

Building a better battery, faster

Battery experts at PNNL and elsewhere focus on developing rechargeable lithium-metal batteries because of their high energy density. Lithium-metal batteries have the potential to double the energy of lithium-ion batteries ...

Software

Microsoft offers its own File Recovery Tool for Windows 10

It's hard to believe in this age of computer viruses, phishing attacks, ransomware, trojan horses, denial-of-service attacks and keystroke logging that there was once a time before the Internet when just about the only worry ...

Computer Sciences

Identifying a melody by studying a musician's body language

We listen to music with our ears, but also our eyes, watching with appreciation as the pianist's fingers fly over the keys and the violinist's bow rocks across the ridge of strings. When the ear fails to tell two instruments ...

Engineering

Microlandscaped abrasive tools deliver perfect grinding results

Tiny pyramids and cubes precisely aligned in rows and columns or radial lines of minute raised dots—these microscopic structures whose size is similar to the width of a human hair, are enabling engineers to design novel ...

Security

CyberGraph: mapping cyber threats to prevent the next attack

Although nearly every aspect of our lives relies on technology, our current cybersecurity infrastructure is not prepared to effectively defend our social, economic and political organizations from advancing cyberattacks, ...

page 1 from 10