New oceanographic insight pinpoints marine 'hotspots of risk'

Increased computing power has given fisheries researchers new tools to identify "hotspots of risk," where ocean fronts and eddies bring together masses of fish, fishermen and predators, raising the risk of entangling non-target ...

When space launchers come clean

The upper stages of space launchers are typically loaded with sensors that could theoretically tell engineers everything they need to know about the launcher's status and possible vulnerabilities. Yet, limited on-board computing ...

Towards sustainable blockchains

As blockchains become ever more popular and widespread, a growing concern is their sustainability. Current designs, most notably the blockchain underlying the Bitcoin cryptocurrency, are secured using so-called "proofs of ...

Bitcoin more vulnerable to attack than expected

Calculations by University of Twente researchers show that Bitcoin is more vulnerable to attack than people had always assumed. If some Bitcoin users were to form a group that controls 20 percent of the currency's computing ...

Bitcoin heist: 600 powerful computers stolen in Iceland

Some 600 computers used to "mine" bitcoin and other virtual currencies have been stolen from data centers in Iceland in what police say is the biggest series of thefts ever in the North Atlantic island nation.

'Negative capacitance' could bring more efficient transistors

Researchers have experimentally demonstrated how to harness a property called negative capacitance for a new type of transistor that could reduce power consumption, validating a theory proposed in 2008 by a team at Purdue ...

High-performance computing methods focus of new text

From your smartphone to your laptop, today's tech devices glean their computing power from multi-core processors. Supercomputers contain thousands of cores, and within three to four years a computer with 100 million cores—and ...

page 13 from 40