NASA sees Tropical Storm Son-tinh moving into South China Sea

Tropical Storm Son-tinh soaked the Philippines and is now moving into the South China Sea. NASA's Aqua satellite captured a visible image of the storm as the bulk western half of the storm had already moved over water.

Final data release from DESI Legacy Imaging Surveys issued

Astronomers using images from Kitt Peak National Observatory and Cerro Tololo Inter-American Observatory have created the largest ever map of the sky, comprising over a billion galaxies. The ninth and final data release from ...

NASA sees Giovanna reach cyclone strength, threaten Madagascar

Tropical Storm 12S built up steam and became a cyclone on February 10, 2012 as NASA's Terra satellite passed overhead. Residents of east-central Madagascar should prepare for this cyclone to make landfall by February 13 according ...

Bacterial nanopores open the future of data storage

In 2020, each person in the world is producing about 1.7 megabytes of data every second. In just a single year, that amounts to 418 zettabytes—or 418 billion one-terabyte hard drives.

TRMM satellite sees system 98W organizing near Guam, Marianas

NASA's TRMM satellite data revealed heavy rainfall and banding of thunderstorms around the southern quadrant of System 98W in the northwestern Pacific near Guam and the Marianas Islands. Those are two signs that the low pressure ...

A decade on, smartphone-like software finally heads to space

Once a traditional satellite is launched into space, its physical hardware and computer software stay mostly immutable for the rest of its existence as it orbits the Earth, even as the technology it serves on the ground continues ...

World's densest, totally silent solid state drive

Fast disappearing from data centers are power-hungry spinning hard disk drives that hum, buzz, run warm (or even hot), require fans and expensive cooling systems, and can crash unexpectedly.

Yahoo vows to encrypt all its users' personal data (Update)

Yahoo is expanding its efforts to protect its users' online activities from prying eyes by encrypting all the communications and other information flowing into the Internet company's data centers around the world.

page 12 from 35