id stringlengths 1 169 | pr-title stringlengths 2 190 | pr-article stringlengths 0 65k | pr-summary stringlengths 47 4.27k | sc-title stringclasses 2
values | sc-article stringlengths 0 2.03M | sc-abstract stringclasses 2
values | sc-section_names sequencelengths 0 0 | sc-sections sequencelengths 0 0 | sc-authors sequencelengths 0 0 | source stringclasses 2
values | Topic stringclasses 10
values | Citation stringlengths 4 4.58k | Paper_URL stringlengths 4 213 | News_URL stringlengths 4 119 | pr-summary-and-article stringlengths 49 66.1k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0 | New York City's Vaccine Passport Plan Renews Online Privacy Debate | When New York City announced on Tuesday that it would soon require people to show proof of at least one coronavirus vaccine shot to enter businesses, Mayor Bill de Blasio said the system was "simple - just show it and you're in."
Less simple was the privacy debate that the city reignited.
Vaccine passports , which show... | New York's City's mandate that people must show proof at least one coronavirus vaccine shot, or vaccine passport, to enter businesses has revived the debate of whether these digital certificates undermine online privacy. The applications may enable location tracking, and privacy researchers are worried about digital su... | [] | [] | [] | scitechnews | None | None | None | None | New York's City's mandate that people must show proof at least one coronavirus vaccine shot, or vaccine passport, to enter businesses has revived the debate of whether these digital certificates undermine online privacy. The applications may enable location tracking, and privacy researchers are worried about digital su... | |||
1 | Facebook Disables Accounts Tied to NYU Research Project | Facebook Inc. has disabled the personal accounts of a group of New York University researchers studying political ads on the social network, claiming they are scraping data in violation of the company's terms of service.
The company also cut off the researchers' access to Facebook's APIs, technology that is used to sha... | Facebook has disabled the personal accounts of New York University (NYU) scientists studying political ads on the social network, alleging their extraction of data violates its terms of service. Facebook's Mike Clark said the company also blocked their access to Facebook's application programming interfaces, used to sh... | [] | [] | [] | scitechnews | None | None | None | None | Facebook has disabled the personal accounts of New York University (NYU) scientists studying political ads on the social network, alleging their extraction of data violates its terms of service. Facebook's Mike Clark said the company also blocked their access to Facebook's application programming interfaces, used to sh... | |||
2 | Teenage Girls in Northern Nigeria 'Open Their Minds' with Robotics | KANO, Nigeria, Aug 2 (Reuters) - Teenage girls in the northern Nigerian city of Kano are learning robotics, computing and other STEM subjects as part of an innovative project that challenges local views of what girls should be doing in a socially conservative Muslim society.
In a place where girls are expected to marry... | The Kabara non-governmental organization (NGO) in northern Nigeria is helping teenage girls in the city of Kano to learn robotics, computing, and other science, technology, engineering, and math subjects. Founded in 2016 by engineer Hadiza Garbati, Kabara has trained over 200 girls, with plans to extend its reach to ot... | [] | [] | [] | scitechnews | None | None | None | None | The Kabara non-governmental organization (NGO) in northern Nigeria is helping teenage girls in the city of Kano to learn robotics, computing, and other science, technology, engineering, and math subjects. Founded in 2016 by engineer Hadiza Garbati, Kabara has trained over 200 girls, with plans to extend its reach to ot... | |||
3 | 3D 'Heat Map' Animation Shows How Seizures Spread in the Brains of Epilepsy Patients | For 29 years, from the time she was 12, Rashetta Higgins had been wracked by epileptic seizures - as many as 10 a week - in her sleep, at school and at work. She lost four jobs over 10 years. One seizure brought her down as she was climbing concrete stairs, leaving a bloody scene and a bad gash near her eye.
A seizure ... | University of California, San Francisco (UCSF) neuroscientists used an algorithm to visualize in three dimensions hundreds of electroencephalography (EEG) traces in the brain, resulting in an animated heat map of seizures in epileptic patients. UCSF's Robert Knowlton said the tool "makes it much easier to define where ... | [] | [] | [] | scitechnews | None | None | None | None | University of California, San Francisco (UCSF) neuroscientists used an algorithm to visualize in three dimensions hundreds of electroencephalography (EEG) traces in the brain, resulting in an animated heat map of seizures in epileptic patients. UCSF's Robert Knowlton said the tool "makes it much easier to define where ... | |||
4 | Endlessly Changing Playground Teaches AIs to Multitask | What did they learn? Some of DeepMind's XLand AIs played 700,000 different games in 4,000 different worlds, encountering 3.4 million unique tasks in total. Instead of learning the best thing to do in each situation, which is what most existing reinforcement-learning AIs do, the players learned to experiment - moving ob... | Alphabet's DeepMind Technologies has developed a videogame-like three-dimensional world that allows artificial intelligence (AI) agents to learn skills by experimenting and exploring. Those skills can be used to perform tasks they have not performed before. XLand is managed by a central AI that controls the environment... | [] | [] | [] | scitechnews | None | None | None | None | Alphabet's DeepMind Technologies has developed a videogame-like three-dimensional world that allows artificial intelligence (AI) agents to learn skills by experimenting and exploring. Those skills can be used to perform tasks they have not performed before. XLand is managed by a central AI that controls the environment... | |||
5 | CISA Launches Initiative to Combat Ransomware | About the Author
Chris Riotta is a staff writer at FCW covering government procurement and technology policy. Chris joined FCW after covering U.S. politics for three years at The Independent. He earned his master's degree from the Columbia University Graduate School of Journalism, where he served as 2021 class presiden... | The U.S. Cybersecurity and Infrastructure Security Agency (CISA) officially launched the Joint Cyber Defense Collaborative (JCDC), an anti-ransomware initiative supported by public-private information sharing. CISA director Jen Easterly said the organization was created to develop cyber defense strategies and exchange ... | [] | [] | [] | scitechnews | None | None | None | None | The U.S. Cybersecurity and Infrastructure Security Agency (CISA) officially launched the Joint Cyber Defense Collaborative (JCDC), an anti-ransomware initiative supported by public-private information sharing. CISA director Jen Easterly said the organization was created to develop cyber defense strategies and exchange ... | |||
7 | Apple to Scan iPhones for Child Sex Abuse Images | "Regardless of what Apple's long term plans are, they've sent a very clear signal. In their (very influential) opinion, it is safe to build systems that scan users' phones for prohibited content," Matthew Green, a security researcher at Johns Hopkins University, said. | Apple has unveiled a system designed to scan U.S. customers' iPhones to determine if they contain child sexual abuse material (CSAM). The system compares photo files on each handset to a database of known CSAM gathered by the National Center for Missing and Exploited Children and other organizations. Before an iPhone c... | [] | [] | [] | scitechnews | None | None | None | None | Apple has unveiled a system designed to scan U.S. customers' iPhones to determine if they contain child sexual abuse material (CSAM). The system compares photo files on each handset to a database of known CSAM gathered by the National Center for Missing and Exploited Children and other organizations. Before an iPhone c... | |||
8 | Information Transfer Protocol Reaches Quantum Speed Limit | Even though quantum computers are a young technology and aren't yet ready for routine practical use, researchers have already been investigating the theoretical constraints that will bound quantum technologies. One of the things researchers have discovered is that there are limits to how quickly quantum information can... | Joint Quantum Institute (JQI) scientists have developed a quantum information transfer protocol that reaches theoretical speed limits for some quantum operations. The protocol is engineered for quantum devices in which interactions between quantum bits (qubits) weaken as they recede from each other, covering a range of... | [] | [] | [] | scitechnews | None | None | None | None | Joint Quantum Institute (JQI) scientists have developed a quantum information transfer protocol that reaches theoretical speed limits for some quantum operations. The protocol is engineered for quantum devices in which interactions between quantum bits (qubits) weaken as they recede from each other, covering a range of... | |||
10 | Security Flaws Found in Popular EV Chargers | Image Credits: Getty Images
U.K. cybersecurity company Pen Test Partners has identified several vulnerabilities in six home electric vehicle charging brands and a large public EV charging network. While the charger manufacturers resolved most of the issues, the findings are the latest example of the poorly regulated wo... | Analysts at U.K. cybersecurity firm Pen Test Partners have identified flaws in the application programming interfaces of six home electric vehicle (EV) charging brands, as well as the Chargepoint public EV charging station network. Pen Test analyst Vangelis Stykas found several vulnerabilities that could enable hackers... | [] | [] | [] | scitechnews | None | None | None | None | Analysts at U.K. cybersecurity firm Pen Test Partners have identified flaws in the application programming interfaces of six home electric vehicle (EV) charging brands, as well as the Chargepoint public EV charging station network. Pen Test analyst Vangelis Stykas found several vulnerabilities that could enable hackers... | |||
11 | ForCE Model Accurately Predicts How Coasts Will Be Impacted by Storms, Sea-Level Rise | Coastal communities across the world are increasingly facing up to the huge threats posed by a combination of extreme storms and predicted rises in sea levels as a result of global climate change.
However, scientists at the University of Plymouth have developed a simple algorithm-based model which accurately predicts h... | An algorithm-based model developed by researchers at the University of Plymouth in the U.K. predicts the impact of storms and rising sea levels on coastlines with greater than 80% accuracy. The Forecasting Coastal Evolution (ForCE) model can predict the evolution of coastlines and assess their resilience to erosion and... | [] | [] | [] | scitechnews | None | None | None | None | An algorithm-based model developed by researchers at the University of Plymouth in the U.K. predicts the impact of storms and rising sea levels on coastlines with greater than 80% accuracy. The Forecasting Coastal Evolution (ForCE) model can predict the evolution of coastlines and assess their resilience to erosion and... | |||
12 | AI Algorithm to Assess Metastatic Potential in Skin Cancers | DALLAS - August 3, 2021 - Using artificial intelligence (AI), researchers from UT Southwestern have developed a way to accurately predict which skin cancers are highly metastatic. The findings , published as the July cover article of Cell Systems, show the potential for AI-based tools to revolutionize pathology for can... | A new artificial intelligence (AI) algorithm can predict highly metastatic skin cancers. The University of Texas Southwestern Medical Center (UTSW) researchers who developed the algorithm used AI to identify differences between images of melanoma cells with high and low metastatic potential, then used reverse engineeri... | [] | [] | [] | scitechnews | None | None | None | None | A new artificial intelligence (AI) algorithm can predict highly metastatic skin cancers. The University of Texas Southwestern Medical Center (UTSW) researchers who developed the algorithm used AI to identify differences between images of melanoma cells with high and low metastatic potential, then used reverse engineeri... | |||
13 | Do You Hear What I Hear? A Cyberattack. | Cybersecurity analysts deal with an enormous amount of data, especially when monitoring network traffic. If one were to print the data in text form, a single day's worth of network traffic may be akin to a thick phonebook. In other words, detecting an abnormality is like finding a needle in a haystack.
"It's an ocean o... | Carnegie Mellon University's Yang Cai and colleagues have designed a method of making abnormal network traffic audible by rendering cybersecurity data musically. The researchers explored several sound mapping algorithms, converting numeral datasets into music with diverse melodies, harmonies, time signatures, and tempo... | [] | [] | [] | scitechnews | None | None | None | None | Carnegie Mellon University's Yang Cai and colleagues have designed a method of making abnormal network traffic audible by rendering cybersecurity data musically. The researchers explored several sound mapping algorithms, converting numeral datasets into music with diverse melodies, harmonies, time signatures, and tempo... | |||
15 | LLNL Optimizes Flow-Through Electrodes for Electrochemical Reactors with 3D Printing | To take advantage of the growing abundance and cheaper costs of renewable energy, Lawrence Livermore National Laboratory (LLNL) scientists and engineers are 3D printing flow-through electrodes (FTEs), core components of electrochemical reactors used for converting CO 2 and other molecules to useful products.
As describ... | Lawrence Livermore National Laboratory (LLNL) scientists three-dimensionally (3D) printed carbon flow-through electrodes (FTEs) for electrochemical reactors from graphene aerogels. The researchers demonstrated the ability to customize FTE flows and drastically enhance reactant transfer from electrodes onto reactive sur... | [] | [] | [] | scitechnews | None | None | None | None | Lawrence Livermore National Laboratory (LLNL) scientists three-dimensionally (3D) printed carbon flow-through electrodes (FTEs) for electrochemical reactors from graphene aerogels. The researchers demonstrated the ability to customize FTE flows and drastically enhance reactant transfer from electrodes onto reactive sur... | |||
16 | Scientists Share Wiring Diagram Tracing Connections for 200,000 Mouse Brain Cells | Neuroscientists from Seattle's Allen Institute and other research institutions have wrapped up a five-year, multimillion-dollar project with the release of a high-resolution 3-D map showing the connections between 200,000 cells in a clump of mouse brain about as big as a grain of sand.
The data collection, which is now... | A multi-institutional team of neuroscientists spent five years and $100 million developing a high-resolution model detailing the connections between 200,000 mouse brain cells. Created under the federally-funded Machine Intelligence From Cortical Networks (MICrONS) program, the dataset encompasses 120,000 neurons and ab... | [] | [] | [] | scitechnews | None | None | None | None | A multi-institutional team of neuroscientists spent five years and $100 million developing a high-resolution model detailing the connections between 200,000 mouse brain cells. Created under the federally-funded Machine Intelligence From Cortical Networks (MICrONS) program, the dataset encompasses 120,000 neurons and ab... | |||
17 | Census Data Change to Protect Privacy Rattles Researchers, Minority Groups | A plan to protect the confidentiality of Americans' responses to the 2020 census by injecting small, calculated distortions into the results is raising concerns that it will erode their usability for research and distribution of state and federal funds.
The Census Bureau is due to release the first major results of the... | The U.S. Census Bureau will use a complex algorithm to adjust 2020 Census statistics to prevent the data from being recombined to disclose information about individual respondents. The bureau's Ron Jarmin said it will use differential privacy, an approach it has long employed in some fashion, which involves adding stat... | [] | [] | [] | scitechnews | None | None | None | None | The U.S. Census Bureau will use a complex algorithm to adjust 2020 Census statistics to prevent the data from being recombined to disclose information about individual respondents. The bureau's Ron Jarmin said it will use differential privacy, an approach it has long employed in some fashion, which involves adding stat... | |||
18 | Robot Apocalypse Hard to Find in America's Small, Mid-Sized Factories | CLEVELAND, Aug 2 (Reuters) - When researchers from the Massachusetts Institute of Technology visited Rich Gent's machine shop here to see how automation was spreading to America's small and medium-sized factories, they expected to find robots.
They did not.
"In big factories - when you're making the same thing over and... | Although analysts have warned that millions of blue-collar jobs in the U.S. industrial heartland will soon be displaced by robots, that is not yet the case at small and medium-sized factories. Massachusetts Institute of Technology (MIT) researchers studied 34 companies with 500 or fewer employees in Ohio, Massachusetts... | [] | [] | [] | scitechnews | None | None | None | None | Although analysts have warned that millions of blue-collar jobs in the U.S. industrial heartland will soon be displaced by robots, that is not yet the case at small and medium-sized factories. Massachusetts Institute of Technology (MIT) researchers studied 34 companies with 500 or fewer employees in Ohio, Massachusetts... | |||
19 | Insulator-Conductor Transition Points Toward Ultra-Efficient Computing | For the first time, researchers have been able to image how atoms in a computer switch move around on fast timescales while it turns on and off. This ability to peer into the atomic world may hold the key to a new kind of switch for computers that will speed up computing and reduce the energy required for computer proc... | A team of researchers has imaged the movement of atoms in a computer switch turning on and off in real time, which could help lead to super-efficient computing. Researchers at the U.S. Department of Energy's SLAC National Accelerator Laboratory, Stanford University, Hewlett Packard Labs, Pennsylvania State University, ... | [] | [] | [] | scitechnews | None | None | None | None | A team of researchers has imaged the movement of atoms in a computer switch turning on and off in real time, which could help lead to super-efficient computing. Researchers at the U.S. Department of Energy's SLAC National Accelerator Laboratory, Stanford University, Hewlett Packard Labs, Pennsylvania State University, ... | |||
20 | AI Carpenter Can Recreate Furniture From Photos | An algorithm developed by University of Washington (UW) researchers can render photos of wooden objects into three-dimensional (3D) models with enough detail to be replicated by carpenters. The researchers factored in the geometric limitations of flat sheets of wood and how wooden parts can interlock. They captured pho... | [] | [] | [] | scitechnews | None | None | None | None | An algorithm developed by University of Washington (UW) researchers can render photos of wooden objects into three-dimensional (3D) models with enough detail to be replicated by carpenters. The researchers factored in the geometric limitations of flat sheets of wood and how wooden parts can interlock. They captured pho... | ||||
21 | Developers Reveal Programming Languages They Love, Dread | Programmer online community Stack Overflow's 2021 survey of 83,439 software developers in 181 countries found the vast majority (86.69%) named Mozilla's Rust their "most loved" language. Those respondents cited Rust as the language they worked with the most in the past year, and with which they most want to work with n... | [] | [] | [] | scitechnews | None | None | None | None | Programmer online community Stack Overflow's 2021 survey of 83,439 software developers in 181 countries found the vast majority (86.69%) named Mozilla's Rust their "most loved" language. Those respondents cited Rust as the language they worked with the most in the past year, and with which they most want to work with n... | ||||
22 | Apps That Are Redefining Accessibility | Some estimate less than 10% of websites are accessible, meaning they provide assistance in accessing their content to people with visual disabilities. Some companies are tackling the issue by rolling out apps that can be used by anyone, regardless of visual capabilities. One example is Finnish developer Ilkka Pirttimaa... | [] | [] | [] | scitechnews | None | None | None | None | Some estimate less than 10% of websites are accessible, meaning they provide assistance in accessing their content to people with visual disabilities. Some companies are tackling the issue by rolling out apps that can be used by anyone, regardless of visual capabilities. One example is Finnish developer Ilkka Pirttimaa... | ||||
23 | Security Bug Affects Nearly All Hospitals in North America | Researchers from the IoT security firm Armis have discovered nine critical vulnerabilities in the Nexus Control Panel which is used to power all current models of Translogic's pneumatic tube system (PTS) stations by Swisslog Healthcare.
The vulnerabilities have been given the name PwnedPiper and are particularly concer... | Researchers at security firm Armis identified nine critical vulnerabilities in the Nexus Control Panel that powers all current models of Swisslog Healthcare's Translogic pneumatic tube system (PTS) stations. The Translogic PTS system is used in 3,000 hospitals worldwide and 80% of major hospitals in North America to de... | [] | [] | [] | scitechnews | None | None | None | None | Researchers at security firm Armis identified nine critical vulnerabilities in the Nexus Control Panel that powers all current models of Swisslog Healthcare's Translogic pneumatic tube system (PTS) stations. The Translogic PTS system is used in 3,000 hospitals worldwide and 80% of major hospitals in North America to de... | |||
24 | Platform Teaches Nonexperts to Use ML | Machine-learning algorithms are used to find patterns in data that humans wouldn't otherwise notice, and are being deployed to help inform decisions big and small - from COVID-19 vaccination development to Netflix recommendations.
New award-winning research from the Cornell Ann S. Bowers College of Computing and Inform... | An interactive machine learning (ML) platform developed by Cornell University scientists is designed to train nonexperts to use algorithms effectively, efficiently, and ethically. Cornell's Swati Mishra said, "If we design machine learning tools correctly and give enough agency to people to use them, we can ensure thei... | [] | [] | [] | scitechnews | None | None | None | None | An interactive machine learning (ML) platform developed by Cornell University scientists is designed to train nonexperts to use algorithms effectively, efficiently, and ethically. Cornell's Swati Mishra said, "If we design machine learning tools correctly and give enough agency to people to use them, we can ensure thei... | |||
25 | Robotic Police Dogs: Useful Hounds or Dehumanizing Machines? | HONOLULU (AP) - If you're homeless and looking for temporary shelter in Hawaii's capital, expect a visit from a robotic police dog that will scan your eye to make sure you don't have a fever.
That's just one of the ways public safety agencies are starting to use Spot, the best-known of a new commercial category of robo... | Police departments claim to use robotic dogs as simply another tool to keep emergency responders out of danger, but privacy advocates say the robots are secretly being deployed without safeguards against aggressive, invasive, or dehumanizing uses. The New York Police Department acquired a Spot robotic canine last year ... | [] | [] | [] | scitechnews | None | None | None | None | Police departments claim to use robotic dogs as simply another tool to keep emergency responders out of danger, but privacy advocates say the robots are secretly being deployed without safeguards against aggressive, invasive, or dehumanizing uses. The New York Police Department acquired a Spot robotic canine last year ... | |||
26 | EU Fines Amazon Record $888 Million Over Data Violations | Luxembourg's CNPD data protection authority fined Amazon a record $888 million for breaching the EU's General Data Protection Regulation (GDPR). The EU regulator charged the online retailer with processing personal data in violation of GDPR rules, which Amazon denies. The ruling closes an investigation triggered by a 2... | [] | [] | [] | scitechnews | None | None | None | None | Luxembourg's CNPD data protection authority fined Amazon a record $888 million for breaching the EU's General Data Protection Regulation (GDPR). The EU regulator charged the online retailer with processing personal data in violation of GDPR rules, which Amazon denies. The ruling closes an investigation triggered by a 2... |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 4