First images of electrons forming strange solid crystals

Under the right circumstances, electrons can actually “freeze” into a bizarre solid form. Now, physicists at Berkeley Lab have created and taken the first ever direct images of this structure.Continue ReadingCategory: Physics, ScienceTags: Electron Mic… Continue reading First images of electrons forming strange solid crystals

Newmark initiative will bring online a network of civil defense hackers

A new initiative links together volunteer cyber programs with those most needing help.

The post Newmark initiative will bring online a network of civil defense hackers appeared first on CyberScoop.

Continue reading Newmark initiative will bring online a network of civil defense hackers

Sneaky AI model deliberately corrupts training images to sidestep copyright

A big problem with text-to-image generators is their ability to replicate the original works used to train them, thereby infringing an artist’s copyright. Under US law, if you create an original work and ‘fix’ it in a tangible form, you own its copyrig… Continue reading Sneaky AI model deliberately corrupts training images to sidestep copyright

Scientists recreate Pink Floyd classic using only people’s brains

While fans of “Another Brick in the Wall (Part 1)” may be horrified with the results, science on the way to recreating music through brain activity. And it has the potential for incredibly broad applications.Continue ReadingCategory: ScienceTags: Unive… Continue reading Scientists recreate Pink Floyd classic using only people’s brains

New technique will more accurately detect ET’s signals from space

Researchers have developed a new technique to better detect extraterrestrial radio signals by weeding out the interference caused by Earth-based devices. It’s hoped that the technique will lead to the discovery of the first evidence of life outside our… Continue reading New technique will more accurately detect ET’s signals from space

Salted crops seen as powerful tool to combat climate crisis

Salt is one of the oldest and most famous preservatives around. But could it be used to preserve carbon deep underground for thousands of years? Researchers believe it can, and that it just might offer a way forward in combating the atmospheric carbon … Continue reading Salted crops seen as powerful tool to combat climate crisis

Synthetic proteins simplify nature to outperform the real thing

Creating synthetic proteins is a promising avenue of study, but could we take shortcuts on nature’s blueprint and make more efficient versions? Scientists at UC Berkeley have found that simpler combos of synthetic building blocks can make for protein a… Continue reading Synthetic proteins simplify nature to outperform the real thing

Electronic circuit degrades on demand into recyclable pieces

Old electronics are tricky to recycle, meaning they clog up landfills while locking valuable metals away. Now scientists have demonstrated printed circuits that can be degraded on demand, returning their materials to reusable forms.Continue ReadingCate… Continue reading Electronic circuit degrades on demand into recyclable pieces

UCB demonstrates “incredibly cheap and easy” carbon-capture material

UC Berkeley chemists say they’ve created a simple, and very inexpensive way to capture carbon dioxide using a polymer called melamine, that’s far cheaper than metal-organic frameworks. It could capture carbon emissions from smokestacks or tailpipes.Con… Continue reading UCB demonstrates “incredibly cheap and easy” carbon-capture material

‘Trojan Source’ Bug Threatens the Security of All Code

Virtually all compilers — programs that transform human-readable source code into computer-executable machine code — are vulnerable to an insidious attack in which an adversary can introduce targeted vulnerabilities into any software without being detected, new research released today warns. The vulnerability disclosure was coordinated with multiple organizations, some of whom are now releasing updates to address the security weakness. Continue reading ‘Trojan Source’ Bug Threatens the Security of All Code