Nanoreporters Tell ‘Sour’ Oil from ‘Sweet’

Nanoreporters Tell ‘Sour’ Oil from ‘Sweet’

Scientists at Rice University have created a nanoscale detector that checks for and reports on ...

Nanoreporters Tell ‘Sour’ Oil from ‘Sweet’

Nanoreporters Tell ‘Sour’ Oil from ‘Sweet’

Scientists at Rice University have created a nanoscale detector that checks for and reports on the presence of hydrogen sulfide in crude oil and natural gas while they’re still in the ground.   The nanoreporter is based on nanometer-sized carbon material developed by a consortium of Rice labs led by chemist James Tour and is [...]

Read full story Comments { 0 }
Windows Least Privilege Management and Beyond

Windows Least Privilege Management and Beyond

For Windows environments, it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently to restrict administrators so they only access the servers and resources required to perform their job and only during the approved times to perform specific tasks. This white paper examines the security, compliance and efficiency issues surrounding [...]

Read full story Comments { 0 } Download Whitepaper
Computer-Assisted Accelerator Design

Computer-Assisted Accelerator Design

If you walk by room 201 in Building 911 at the U.S. Department of Energy’s Brookhaven National Laboratory, you might think Stephen Brooks is playing a cool new video game. But Brooks is doing important, innovative work. He’s using his own custom designed software to create a 3-D virtual model of the electron accelerator Brookhaven [...]

Read full story Comments { 0 }
Data Center Trend: Distributed Power in the White Space

Data Center Trend: Distributed Power in the White Space

Cloud computing vendors and colocation data centers make every effort to maximize the scalability, efficiency and agility of their data centers. As a result, more and more of them are investigating replacing older, transformer-based centralized power protection schemes with distributed architectures in which uninterruptible power systems (UPSs) reside in the white space (or data hall). [...]

Read full story Comments { 0 } Download Whitepaper
Wireless Power Transfer Achieved at 5m Distance

Wireless Power Transfer Achieved at 5m Distance

The way electronic devices receive their power has changed tremendously over the past few decades, from wired to non-wired. Users today enjoy all kinds of wireless electronic gadgets including cell phones, mobile displays, tablet PCs, and even batteries. The Internet has also shifted from wired to wireless. Now, researchers and engineers are trying to remove [...]

Read full story Comments { 0 }
Diary of a Phone System Implementation

Diary of a Phone System Implementation

90% of businesses attribute their global success to a robust communication structure. This statistic surprises no one. However, the process by which a company must implement said communications system is wrought with surprises. Our diary on the implementation of a phone system gives you an honest look into the successes and challenges at every stage [...]

Read full story Comments { 0 } Download Whitepaper
Simplicity Is Key to Co-Operative Robots

Simplicity Is Key to Co-Operative Robots

A way of making hundreds — or even thousands — of tiny robots cluster to carry out tasks without using any memory or processing power has been developed by engineers at the University of Sheffield, UK.   The team, working in the Sheffield Centre for Robotics (SCentRo), in the University’s Faculty of Engineering, has programmed [...]

Read full story Comments { 0 }
Mint Jutras Report: Is it Time to Purchase a New ERP?

Mint Jutras Report: Is it Time to Purchase a New ERP?

Whether you are contemplating a first time purchase for your entire company, expanding into a new location or deciding whether or not to replace your existing ERP solution, it’s a big decision. For decades ERP implementation in general, and more specifically ERP replacement, has been compared to brain surgery. You just don’t do it unless [...]

Read full story Comments { 0 } Download Whitepaper
Likely Author of Original Bitcoin Paper? Researchers Uncover Linguistic Evidence

Likely Author of Original Bitcoin Paper? Researchers Uncover Linguistic Evidence

The primary author of the celebrated Bitcoin paper is most likely Nick Szabo, a blogger and former George Washington University law professor, according to students and researchers at Aston University’s Centre for Forensic Linguistics.   Their research also challenges the claim that Dorian S. Nakamoto is the main author of the paper, an assertion made [...]

Read full story Comments { 0 }
The Forrester Wave: Privileged Identity Management

The Forrester Wave: Privileged Identity Management

Why read this report: The privileged identity management (PIM) market has matured significantly during the past three years, and it continues to play a significant role in protecting an organization’s data and in business continuity. In Forrester’s 18-criteria evaluation of privileged identity management vendors, we identified the nine most significant solution providers. This report details [...]

Read full story Comments { 0 } Download Whitepaper