research

Mon
04
Dec
John Lister's picture

Study: No Evidence Internet Harms Mental Health

Researchers say they were unable to find a clear link between Internet use and harm to mental health. However, the results looked at national populations as a whole, rather than individual behavior. The researchers, from Oxford University's Oxford ... Internet Institute, said they were limited by a lack of data and cooperation from major tech companies. The broad research paper, "Global Well-Being and Mental Health in the Internet Age", looked at studies of psychological wellbeing of around 2.4 million people across 18 countries. The researchers looked at changes in reported wellbeing between ... (view more)

Wed
29
Jul
John Lister's picture

Microsoft Program Adapted to Predict Stem Cell Outcome

Software developed to hunt down bugs in programs for Windows has been adapted for stem cell research. Though the two tasks sound nothing alike, they both involve calculating the link between cause and effect. New Scientist reports that the software ... is known as the Reasoning Engine for Interaction Networks, or RE:IN. It's been made available through Microsoft's research unit to several scientists who specialize in stem cells. (Source: newscientist.com ) A stem cell is effectively the blank slate of cells in mammals. As well as dividing to produce more stem cells (meaning that the body ... (view more)

Wed
05
Mar
John Lister's picture

WiFi Virus Spreads Like Airborne Disease

Computer researchers have created an 'airborne' computer virus that takes advantage of WiFi (wireless Internet) routers. The point of the study is to highlight the many ways in which wireless routers are open to abuse. The research studied wireless ... access points, and was completed by the University of Liverpool. Access points are electronic devices that relay information from a local wireless network to another (typically the Internet). For example: a PC or laptop connected to a wireless router (which is then connected to the Internet) would be considered an access point. The goal of ... (view more)

Fri
04
Jan
Dennis Faas's picture

Shocking New Study Evaluates Antivirus Products

Security researchers have recently claimed the leading antivirus products demonstrate just a 1-in-20 chance of detecting new malicious software. However, high-profile figures in the security industry have questioned the validity of this new ... research. The research was conducted by Imperva, a digital security firm based in California. It intentionally set out to collect samples of virus code. To make sure it was collecting new samples of brand new viruses, Imperva searched discussion forums for hackers offering tips on how to breach security defenses. After gathering 82 examples of malicious ... (view more)

Mon
26
Mar
Dennis Faas's picture

'Microsoft Research Cliplets 1.0.2', and 'Microsoft NoReplyAll Outlook Add-In 2.4.1'

Microsoft Research Cliplets 1.0.2 Microsoft Research Cliplets is an interactive application that uses semi-automated methods to give users the power to create "cliplets," a type of imagery somewhere between stills and video from handheld cameras. ... The software provides a creative lens one can use to focus on important aspects of what's on the screen by performing 'spatiotemporal compositing' and other forms of editing on whatever video-clip you wish. http://microsoft.com Microsoft NoReplyAll Outlook Add-In 2.4.1 The primary function of this add-in for the popular Outlook software is ... (view more)

Mon
17
Oct
Dennis Faas's picture

Scientists: Table Salt to Increase Storage Density

A tandem of researchers in Singapore claim to have discovered a way to use table salt as a means to increase the density at which bits of data can be stored on a hard disk drive platter. Early projections indicate that this 'salty' method is ... actually 5 times more efficient than current hard disk densities. The method was first introduced by Joel Yang, a scientist at the Institute of Materials Research and Engineering (IMRE) at Singapore's Agency for Science, Technology and Research. Yang was able to hone his method using an extremely high-resolution e-beam lithography -- the same process by ... (view more)

Fri
19
Aug
Dennis Faas's picture

Report: Teachers Also a Target of Cyber Bullying

There have been numerous reports of children being bullied by classmates through online services. But now it appears that teachers are suffering similar treatment. New research by Professor Andy Phippen of Plymouth University in the United Kingdom ... found that 35 per cent of those questioned had suffered online abuse -- most notably in the form of online verbal attacks (also known as "cyber bullying"). Though the research noted that 60 per cent of the victims were female, around 70 per cent of all teachers are women, meaning the figures show men were slightly more likely to be ... (view more)

Tue
17
Aug
Dennis Faas's picture

1 in 4 Students Using Mac: Report

According to a recent study by higher-education research company Student Monitor, more and more university and college students are buying up Apple laptops. Apple's growth in this lucrative market has led one analyst to question whether or not ... Microsoft is staying in touch with younger tech users. Student Monitor says about one in four laptops found on U.S. college campuses are Apple products -- a startling statistic, given that another tech research firm, Net Applications, not long ago estimated that Macbooks represent only about 5 per cent of computers used worldwide. Microsoft Unable to ... (view more)

Mon
12
Jul
Dennis Faas's picture

Honeypot

In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a ... network, but is actually isolated, (un)protected, and monitored, and which seems to contain information or a resource of value to attackers. Honeypot Function A honeypot is valuable as a surveillance and early-warning tool. While it is often a computer, a honeypot can take other forms, such as files or data records, or even unused IP address space. ... (view more)

Mon
09
Nov
Dennis Faas's picture

'Microsoft Research Virtual Wifi', and 'Files To Phones'

Microsoft Research Virtual Wifi Virtual WiFi helps a user connect to multiple IEEE 802.11 networks with one WiFi card. It works by exposing multiple virtual adapters, one for each wireless network to which connectivity is desired. Virtual WiFi uses ... a network hopping scheme to switch the wireless card across the desired wireless networks. http://research.microsoft.com Files To Phones Send any files from PC to a mobile phone. Files to Phones provides free transmission of any files (TXT, MP3, JPG, 3GP, MP4, vCal, vCard) to any Bluetooth devices (mobile phones, smartphones, hand-held devices, ... (view more)

Pages

Subscribe to RSS - research