-
Social media helps officials spot public health threats — but only for the rich?
May 12, 2017 | NewsKnowing the demographic and socioeconomic breakdown of social media-generated data can better shape the design of research studies and public health surveillance systems.
-
Social media helps officials spot public health threats — but only for the rich?
| NewsKnowing the demographic and socioeconomic breakdown of social media-generated data can better shape the design of research studies and public health surveillance systems.
-
NSF looks to future-proof high-performance computing
| NewsThe National Science Foundation said it is looking for a high-performance system that can grow into a leadership-class computing facility.
-
NSF looks to future-proof high-performance computing
| NewsThe National Science Foundation said it is looking for a high-performance system that can grow into a leadership-class computing facility.
-
Making multifactor authentication a reality
May 11, 2017 | NewsModern, standards-compliant, multifactor authentication is one of the most effective ways organizations can reduce cyber risk, a new report says.
-
Smart infrastructure for roadside-to-vehicle communication
| NewsSinWaves’ wireless system transmits road-related information to alert approaching drivers and autonomous vehicles to upcoming events.
-
IoT fuels next-gen law enforcement
| NewsGrowing federal investments in the internet of things -- including cloud, analytics and sensor technologies -- will power physical and cybersecurity, a new study shows.
-
Census director’s resignation could affect control of Congress after 2020
| NewsA properly funded census will help ensure accuracy in the number of states’ congressional representatives and votes in the Electoral College.
-
The hidden challenge behind body cams — storage
| NewsAn open source, software-defined storage solution helped a small town manage its body-worn camera and surveillance data.
-
Can machine learning help secure the IoT?
May 10, 2017 | NewsMachine learning and analytics can spot anomalies in network traffic indicating a compromised device.