Recommendation for cryptographic key generation

Cryptography is often used in information technology security environments to protect sensitive, high-value data that might be compromised during transmission or while in storage. It relies upon two basic components: an algorithm ...

TESS finds its first rogue planet

Well over 5,000 planets have been found orbiting other star systems. One of the satellites hunting for them is TESS, the Transiting Exoplanet Survey Satellite. Astronomers using TESS think they are made a rather surprising ...

US military to pack more BlackBerry smartphones

Research In Motion (RIM) on Wednesday announced that the US Department of Defense staff and partners have been given the go-ahead to use more of the Canadian firm's BlackBerry OS 7 smartphones.

Discovering a brown dwarf binary star with microlensing

Brown dwarfs are stars less massive than the sun and unable to burn hydrogen. They comprise (at least in mass) a bridge between planets and stars, and astronomers think that they form and evolve in ways different from either ...

Custom glass bending

The possible applications for curved glass panels are many and varied – ranging from facades to designer furniture. Researchers have now developed a process which enables the panels to be shaped six times faster and ...

Curves alter crystallization, study finds

Scientists have studied crystallization since the time of Galileo, so it's easy to imagine there's nothing new to learn about the process. Harvard researchers might beg to differ.

page 9 from 13