Topics Cloud - Click To Browse
Electronics Environment Europe NanoTechnology Pesticides Pollution Research Rivers About Us (1)
Arts & Literature (4)
Cyber Security (65)
- It’s Alive: Latest Earthquakes in the World – Past 7 days from the USGS 14,626 views
- Self-sufficiency: The Politics of Iran’s Space Program 14,473 views
- Career Management: The most demanded Jobs in the next 20 years 13,614 views
- Engineering: Tokyo’s Skycrapers Moved but didn’t Collapse 11,982 views
- Apple: Designed in California – Assembled in China 11,064 views
- Stealth: A Modified Boeing-Sikorsky UH-60 Comanche? 11,001 views
- Interactive Map: Scientists Project Path of Radiation Plume 10,867 views
- US Air Force: The Quest for a Sixth Generation Fighter 10,291 views
- Mail Online: The Japanese road repaired SIX days after it was destroyed by quake 10,271 views
- NYT: Why We Travel or the Quest of the Self in Today’s World Turmoil 9,840 views
- GE Global 2012 Innovation Barometer: Between Perception and Reality 9,813 views
- What counts as success for “Super Mario Run” January 2, 2017WHEN it was finally released on December 15th, “Super Mario Run” quickly became the most downloaded free game in Apple’s app stores in 138 countries. At last count well over 50m people had downloaded it. In contrast, all Super Mario titles released over the past three decades have together sold some 558m copies.
- What counts as success for “Super Mario Run” January 2, 2017
Cyber Security Archive
The The U.S. Commerce Department’s National Institute of Standards and Technology (NIST) unveiled a first draft of a security self-assessment tool...
BYU: ” A new study from BYU – Brigham Young University, in collaboration with Google Chrome engineers, finds the status quo...
Last December 23rd, about 700,000 Ukrainian customers lost power between 3 and 6 hours. The SANS Industrial Control System (ICS) team provided...
Plymouth University: “A system using images and a one-time numerical code could provide a secure and easy to use alternative...
A recent paper by Professor Stephanie Forrest and Ph.D. student Benjamin Edwards from the Department of Computer Science at University of...
ACMTech: “Powerful quantum computers able to break the security of the Internet are predicted to become a reality in a...
ISN: “Do recent cyber-attacks – including North Korea’s against Sony and a Stuxnet-style attack against a German steel works –...
According to a research by a Georgia Tech team presented December 15 at the 47th Annual IEEE/ACM International Symposium on Microarchitecture in...
Cornell Chronicle: “When you send a message on the Internet, your computer encodes letters, numbers and other data into strings...
An interesting paper titled “RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.” was published passed December by Daniel Genkin (Technion and Tel Aviv), Adi...