
Will L.A.’s Anti-Terrorist Subway Scanners Be Adopted Everywhere?
Terahertz millimeter-wave technology will screen passengers for bombs and suicide vests from 10 meters distance as they rush to make the next train
Wendy M. Grossman, a frequent contributor on information technology, is based in London.
Terahertz millimeter-wave technology will screen passengers for bombs and suicide vests from 10 meters distance as they rush to make the next train
There are more pragmatic than pernicious reasons why a government official would want to use personal e-mail and their own server
A successor to an essential part in today’s computers may arrive in just a few years
A unique camera “signature” to identify online criminals
The ramifications from the years-long security hole are both better and worse than we initially thought
Here is what you need to know to understand the problem and how to respond
A new technique exploits sensor noise patterns unique to each camera that can help identify criminals via photographs posted online
To avoid being the target of big-data snooping, run your own e-mail server
Aaron Swartz was threatened with criminal trial for downloading millions of academic articles. Although he may have employed questionable methods, the data-access principles he fought for are becoming widely embraced...
Rumors abound about the famous clock tower's imminent demise, blaming the 1999 construction of an underground train station. But those in the know say it ain't so
The approach to create a more authentic voice for the film critic will attempt to blend two processes: unit selection and the Hidden Markov Model Speech Synthesis System
Some science and medical journal editors avoid publishing research findings that could draw lawsuits under restrictive libel laws. Journalists also find this law chilling. A new U.K. bill set for this spring could protect scholars' and reporters' free speech rights...
A Grammy Award for restoring music through electrical hum
A design to block RFID tags
British Telecom bets all on internet protocols
Furor erupts over toll collecting on the Internet
Is it time to decouple time from the Earth's spin?
Piracy protection may redefine home recording
A hole for external control of Bluetooth devices
Making trusted computing work with privacy
Support science journalism.
Thanks for reading Scientific American. Knowledge awaits.
Already a subscriber? Sign in.
Thanks for reading Scientific American. Create your free account or Sign in to continue.
Create Account