August 25th, 2009 by Eugene Barsky | No Comments »
I have posted about climate engineering before. Here is the new article from the last issue of Science that discusses the risks of climate engineering – “Risks of Climate Engineering”
Risks of Climate Engineering
Gabriele C. Hegerl and Susan Solomon (21 August 2009)
Science 325 (5943), 955. [DOI: 10.1126/science.1178530]
This short opinion article presents the points against temperature changes potentially caused by geoengineering…
** photo by http://www.flickr.com/photos/courambel/
Posted in Atmospheric Science, Chemical and Biological Engineering, Earth and Ocean Sciences, General Science, Geography, Main, Physics | No Comments »
August 18th, 2009 by Eugene Barsky | No Comments »
All IMS articles 2004 and forward are freely available in a postprint format on arXiv <http://arxiv.org/>, as well as those articles posted by authors.
From the IMS website: http://www.imstat.org/publications/arxiv.html
ArXiv is an open access, fully automated electronic archive and distribution server for research articles, now owned and operated by Cornell University, and partially funded by NSF. The main fields it covers are physics, mathematics, non-linear science, computer science, and quantitative biology. Recently, arXiv has cooperated with IMS and the Bernoulli Society to open up a new statistics category within mathematics. We expect this category to eventually grow into a top level archive comparable to e.g. mathematics and physics.
Great news, IMS!
** photo by http://www.flickr.com/photos/saz/
Posted in Main, Mathematics, News, Science - undegraduate classes, Statistics | No Comments »
August 7th, 2009 by Kevin Lindstrom | No Comments »
“Vanish is a research system designed to give users control over the lifetime of personal data stored on the web or in the cloud. Specifically, all copies of Vanish encrypted data — even archived or cached copies — will become permanently unreadable at a specific time, without any action on the part of the user or any third party or centralized service.”
“For example, using the Firefox Vanish plugin, a user can create an email, a Google Doc document, a Facebook message, or a blog comment — specifying that the document or message should “vanish” in 8 hours. Before that 8-hour timeout expires, anyone who has access to the data can read it; however after that timer expires, nobody can read that web content — not the user, not Google, not Facebook, not a hacker who breaks into the cloud service, and not even someone who obtains a warrant for that data. That data — regardless of where stored or archived prior to the timeout — simply self-destructs and becomes permanently unreadable.”
For more information, visit the Vanish site at the Department of Computer Science, University of Washington.
There is a also a technical paper that will be presented at the 18th USENIX Security Symposium taking place this August in Montreal.
Submitted by Kevin Lindstrom Liaison Librarian for Electrical and Computer Engineering
Posted in General Science, Main, Uncategorized | No Comments »
August 5th, 2009 by Eugene Barsky | No Comments »
The International Mathematical Union is offering videos that were recorded at the International Congresses of Mathematicians in 1998, 2002, and 2006. IMU maintains the copyright of the videos but gives everyone interested the permission to download and show the videos.
http://www.mathunion.org/activities/icm/videos
** photo by http://www.flickr.com/photos/mscolly/
Posted in Main, Mathematics, Science - undegraduate classes | No Comments »