Press "esc" to clear
Go to Advanced Search

Showing results

4150 of 723
fontcode-roadmap4.png

Article ID: 694376

Researchers Hide Information in Plain Text

Columbia University School of Engineering and Applied Science

Columbia Engineering computer scientists invent FontCode, a way to embed hidden information in ordinary text by imperceptibly changing the shapes of fonts in text. The hidden information persists even when documents or images with perturbed texts are printed or converted to another file type. Method could prevent document tampering, protect copyrights, as well as embed QR codes and other metadata without altering the look or layout of a document.

Released:
10-May-2018 3:00 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Article ID: 693929

MBA Students Collaborate Across Cultures at Cornell Tech Hackathon

Cornell University

There was $22,000 in prize money at stake when 130 American and Chinese students came together at Cornell Tech’s Roosevelt Island campus for the third annual Hackathon among Cornell MBA students from campuses in Beijing, Ithaca and New York City April 28-29.

Released:
2-May-2018 4:15 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites

Article ID: 693773

S&T Conducts Test and Evaluation of the U.S. Coast Guard’s National Security Cutter

Homeland Security's Science & Technology Directorate

Since December 2017, DHS S&T has participated with the U.S. Navy and the U.S. Coast Guard in several tests and evaluations of two National Security Cutters, USCGC Hamilton and USCGC James, to independently confirm that operational capability is delivered to the Coast Guard fleet.

Released:
1-May-2018 9:50 AM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Article ID: 693769

DHS S&T Awards First Phase 4 Award for IOT Security

Homeland Security's Science & Technology Directorate

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) announced today Ionic Security, Inc., based in Atlanta, Georgia, is the first company to successfully complete prototype testing and move to the pilot deployment phase as part of the Silicon Valley Innovation Program (SVIP).

Released:
1-May-2018 9:40 AM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment
EgmontChannel-R4-20180404_2.jpg

Article ID: 693704

Coast Guard Develops and Tests Environmentally-Friendly Buoy Moorings

Homeland Security's Science & Technology Directorate

From among the proposals, S&T found a potential solution to the problem in a simple, but effective, buoy mooring system: instead of a concrete sinker and a heavy metal chain, a narrow screw anchor and an elastic rope to prevent scraping of the ocean floor was proposed and accepted.

Released:
30-Apr-2018 10:05 AM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Article ID: 693644

Vanderbilt’s Sarah Igo Places Today’s Privacy Concerns in Historical Context

Vanderbilt University

What, exactly, is privacy, and how did it become a right to protect or a setting to be managed? Sarah Igo, associate professor of history and author of “The Known Citizen: A History of Privacy in Modern America,” explains how questions raised by social media manipulation and financial data breaches fit into a long-running privacy debate in the United States centered on how and when individuals ought to be known by the larger society.

Released:
27-Apr-2018 11:05 AM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Law and Public Policy

VT98828_20140526.jpg

Article ID: 693531

Facebook’s Release of Content Guidelines a Step in the Right Direction, Virginia Tech Expert Says

Virginia Tech

Released:
26-Apr-2018 5:05 AM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Social and Behavioral Sciences

ComputerDeception.jpg

Article ID: 693494

Disguising Access Patterns to Protect Sensitive Data in the Cloud

Iowa State University

A team of computer scientists is working to defend against the next potential cyber risk – cloud storage. Wensheng Zhang, an associate professor of computer science at Iowa State University, says cloud users can encrypt sensitive data and information, but how they access the data may make it vulnerable.

Released:
25-Apr-2018 3:50 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment
ORNL_machine_speak_demo1.jpg

Article ID: 693295

Machine Speak: Left to Their Own Devices, Computers Can Figure It Out

Oak Ridge National Laboratory

Using novel machine learning techniques, a research team from Oak Ridge National Laboratory is teaching electronic devices how to speak for themselves.

Released:
23-Apr-2018 1:30 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment
McMillin_Bruce1200px.jpg

Article ID: 693016

Expert Available to Discuss Cyber Security Following Alleged Russian Cyberattacks

Missouri University of Science and Technology

Released:
17-Apr-2018 5:05 PM EDT
EXPERT AVAILABLE
Open in New Tab
Add to Favorites
Comment

Showing results

4150 of 723





Chat now!