Items tagged with Research

Every year, rice farming (specifically, rice milling) generates about 100 million tons of waste. The inedible protective covering of the actual rice grains, known as hulls or husks, can be used in a variety of ways, such as making cement, but there's a lot more demand for rice than there is for rice... Read more...
As we approach the practical physical limits of silicon-based semiconductor manufacturing, researchers have been frantically searching for the next advancement that will allow us to continue producing faster and faster chips. Some folks are looking at exotic materials, some folks are counting on advancements in layout... Read more...
Nobody can accuse screen replacements of being inexpensive or easy to do. The panels must be produced in expensive micro fabrication facilities, by trained technicians, to exacting standards, sometimes using exotic materials. If a group from the University of Minnesota Twin Cities has its way though, that could... Read more...
It is well established that facial recognition based on machine learning is not perfect by any stretch of the imagination; therefore, using it for security purposes is likely a bad idea. This has now been proven through research from Ben-Gurion University of the Negev, which showed that digital and real makeup could... Read more...
One of the potentially devastating side effects of strokes is the loss of ability to speak. Researchers for the most part have adopted “spelling-based” systems that allow patients to type out their words one letter at a time. However, researchers have recently discovered other ways for patients to more quickly... Read more...
As the push for privacy ramps up, user data collection is beginning to drop, starving people and organizations of useful information for legitimate purposes like research. To combat this, Mozilla has created Rally, a tool that allows users to selectively “contribute their browsing data to crowdfund projects for a... Read more...
Though industrial cyberattacks, such as those on JBS Global or Colonial Pipeline, are on the rise, the problem is not exclusive to businesses. According to new research, consumer cyber threats jumped nearly 83% in 2020. With new types of malware skyrocketing, users now need to be more careful than ever. Today, Atlas... Read more...
It was just earlier this month that IBM announced an incredible manufacturing breakthrough with its 2-nm manufacturing process that crammed 50 billion transistors into the size of a fingernail. While that's still a future-looking technology that hasn't made it into mass production (and thereby not a solution for our... Read more...
Cloud-based additions to mobile apps have become commonplace, but they are not always the best thing for consumers or developers. According to new research, by either misconfiguration or simple lack of security best practices, some mobile app developers have left the personal data of over 100 million people at... Read more...
After a cybercriminal manages to breach a network, it is not all about immediately attacking the target. New research shows that these black hat hackers may lie dormant or lurk on a network for around 250 hours on average before an attack kicks off or they are detected. This means that organizations should know that... Read more...
During yesterday’s Google I/O event, we heard about several updates to Google software products, including Android 12 and Wear OS. Google also managed to bring in actor Michael Peña to tour the new Google quantum computing and AI campus. Today, we get to take a closer look at it so let us dive right in… Google’s... Read more...
In April, we first reported on Linux Kernel dev and maintainer Greg Kroah-Hartman banned submissions from the University of Minnesota due to new concerning patches. It has also come to light that UMN has done questionable research on the Linux kernel team, and people were already wary. Now, the Linux Technical... Read more...
If you watch too much TV or play on your phone for too long, and your brain will go to mush. Or at least that is what we have been told over the years. While those claims may be outlandish, there have been legitimate concerns about increased mental health problems relating to increased technology use. Researchers at... Read more...
Apple's AirDrop can be an incredibly useful utility or just something to send memes to friends sitting nearby. Either way, it is possible that you could be sending more than you bargained for, as researchers have found that an attacker could glean the phone number and email of AirDrop users. Evidently, the researchers... Read more...
Yesterday we reported on a Linux kernel developer "banning" the University of Minnesota from providing patches to the kernel. However, this did not come out of the blue as some faculty and students had performed questionable research that wasted Linux kernel maintainers’ time and effort. It appears staff at UMN are... Read more...
When independent or academic research is carried out, ethics is a primary concern if you have anything to do with people outside the research group. With that in mind, the University of Minnesota has seemingly been performing ethically questionable research on the Linux kernel by submitting useless or vulnerable code... Read more...
Researchers working on a joint United States-China team are gaining a lot of attention for their most recent breakthrough. The team, which published its findings in the science journal Cell, managed to create hybrid human-monkey embryos, otherwise known as chimeras. If this sounds like something out of... Read more...
Security breaches and data loss have been rampant problems for companies in recent years, with it seeming like there was a new victim every week. These security issues have also had some dire consequences, such as the first possible ransomware-related death at a hospital. As such, organizations are facing a harsh... Read more...
Deepfakes are beginning to grow in popularity and quality, such as the recent Tom Cruise deepfakes posted to TikTok. Deepfakes raise concerns over what is and isn't real when it comes to various media formats. Subsequently, researchers at the University of Buffalo have developed an AI system that can detect whether an... Read more...
Over the last nearly two weeks, we have seen Microsoft deploying emergency patches and telling companies to secure Exchange servers due to Chinese hackers exploiting a 0-day vulnerability. When vulnerabilities such as this are published, security researchers and hackers alike jump on the opportunity to develop... Read more...
Somewhere between Babe and Elon Musk’s Neuralink experiments are pigs playing video games for science. Though it may sound bizarre, researchers Candace Croney and Sarah Boysen wanted to better understand the cognitive ability of pigs, through training and manipulating a joystick-operated video game task. This training and subsequent research Read more...
Over the years, several studies have linked violent video games to violent behaviors in real life. However, those studies have been a pain in the side of ordinary people who understand the studies are a bunch of hogwash. A new ten-year-long study has come out, explaining that violent video games do not cause kids to... Read more...
Prev 1 2 3 4 5 Next