Detecting program-tampering in the cloud

For small and midsize organizations, the outsourcing of demanding computational tasks to the cloud—huge banks of computers accessible over the Internet—can be much more cost-effective than buying their own hardware. But ...

The real impact of the Chernobyl accident

The impact of the Chernobyl nuclear accident has been seriously overestimated, while unfounded statements presented as scientific facts have been used to strangle the nuclear industry, according to Russian researchers. Writing ...

Knobbly knees in competition with fingerprints

Forget digital fingerprints, iris recognition and voice identification, the next big thing in biometrics could be your knobbly knees. Just as a fingerprints and other body parts are unique to us as individuals and so can ...

Computers 'taught' to ID regulating gene sequences

Johns Hopkins researchers have succeeded in teaching computers how to identify commonalities in DNA sequences known to regulate gene activity, and to then use those commonalities to predict other regulatory regions throughout ...

S. Korea labels chemical leak area 'disaster' zone

The South Korean government on Monday designated an area hit by a toxic chemical leak as a "special disaster" zone, after more than 3,000 people were treated for ailments ranging from nausea to chest pain.

Privacy risks from geographic information

In today's world more geographic information is being collected about us, such as where we live, where the clinic we visited is located, and where we work. Web sites are also collecting more geographic information about their ...

page 2 from 2