Technology

Technology news related to the Internet, telecommunications, electronics, and breakthroughs


Apt, an NSF-funded precursor to CloudLab, is a testbed instrument that is adaptable to many different research domains through customizable profiles. Shown here is the computer cluster that provides the main hardware resource for Apt. It is comprised of approximately 200 servers that are located in the University of Utah's Downtown Data Center. The Utah portion of CloudLab will go into the same facility - in fact, right next to the equipment in the photographs. Credit: Chris Coleman, School of Computing, University of Utah
Apt, an NSF-funded precursor to CloudLab, is a testbed instrument that is adaptable to many different research domains through customizable profiles. Shown here is the computer cluster that provides the main hardware resource for Apt. It is comprised of approximately 200 servers that are located in the University of Utah's Downtown Data Center. The Utah portion of CloudLab will go into the same facility - in fact, right next to the equipment in the photographs. Credit: Chris Coleman, School of Computing, University of Utah


Enabling A New Future For Cloud Computing

The National Science Foundation (NSF) today announced two $10 million projects to create cloud computing testbeds–to be called “Chameleon” and “CloudLab”–that will enable the academic research community to develop and experiment with novel cloud architectures and pursue new, architecturally-enabled applications of cloud computing. Cloud computing refers to the practice of using a network of remote […]

Marines monitor aircraft and ground troops for information to pass to combat elements, Operation Javelin Thrust (U. S. Marine Corps/ Chelsea Flowers)
Marines monitor aircraft and ground troops for information to pass to combat elements, Operation Javelin Thrust (U. S. Marine Corps/ Chelsea Flowers)


Cyber Power In 21st-Century Joint Warfare – Analysis

By E. Lincoln Bonner III In 2008, Russian military forces, supported by cyber attacks, rapidly defeated opposing Georgian forces and seized territory later traded in exchange for Georgia’s granting greater autonomy to pro-Russian governments in South Ossetia and Abkhazia. Cyber power is the ability to exploit cyberspace to create advantages and influence events, and cyberspace […]

Actor/comedian Robin Williams entertains the crew of USS Enterprise (CVN 65) during a holiday special hosted by the United Service Organization (USO). Photo US Navy.
Actor/comedian Robin Williams entertains the crew of USS Enterprise (CVN 65) during a holiday special hosted by the United Service Organization (USO). Photo US Navy.


Robin Williams And Social Media – OpEd

First up: Robin Williams was a fine actor by all means. His death is an unfortunate and tragic incident. As soon as word got out about Williams’ death, the internet mourned the loss of a very talented actor. Rightfully so. Social media, online publications, blogs and everything else was filled with “RIP Robin” messages, and […]

A man during the 2011 Egyptian protests carrying a card saying "Facebook,#jan25, The Egyptian Social Network". Photo by Essam Sharaf, Wikipedia Commons.
A man during the 2011 Egyptian protests carrying a card saying "Facebook,#jan25, The Egyptian Social Network". Photo by Essam Sharaf, Wikipedia Commons.


Is Informationalization Good For The Middle East? – Analysis

By Jon W. Anderson Nearly all studies and most opinion about new media and information technologies in the Middle East have held that they are a boon in an environment of information-averse regimes, state-controlled media, and limited communications. New media, in this reckoning, open communications to new voices, foster an expanded public sphere,[1] break the […]

Hospital


Hackers Steal 4.5 Million Patient Records From Multi-State Hospital Network

About 4.5 million patients at any of the 206 Community Health Systems-operated hospitals around the United States have had their records stolen by hackers, the company announced Monday. The stolen data includes very sensitive information. Anyone who received treatment in a CHS-operated hospital over the last five years is affected by the breach. However, patients […]

robot


Asimov’s Three Laws Of Robotics Supplemented For 21st Century Care Robots

Isaac Asimov famously devised three laws of robotics that underpinned a number of his science fiction books and short stories, Professor Tom Sorell of the University of Warwick has helped develop a new set of rules that they believe will be needed for 21st century care robots. Following recent developments in robotics research philosopher Professor […]