Security experts from more than 30 organizations recently called on enterprises to put more pressure on security vendors to ensure secure code development. InfoWorld From ACM TechNews | February 17, 2010
Right now, troops trying to listen in on enemy chatter rely on a convoluted process. They tune into insurgency radio frequencies, then hand the radio over to local...Wired From ACM News | February 17, 2010
Transfers of large amounts of data across the Internet to wireless devices suffer from a key problem: The Transmission Control Protocol (TCP) used to send and receive...Technology Review From ACM News | February 16, 2010
Unknown hackers have taken out U.S. cellphone networks in an ongoing cyber-attack that will soon knock out parts of the nation's electricity grid – say the officials...New Scientist From ACM News | February 16, 2010
Using state-of-the-art flow measurements, engineering professor Timothy Wei and students at Rensselaer Polytechnic Institute in Troy, N.Y., are employing science...Rensselaer Polytechnic Institute From ACM News | February 12, 2010
IBM's Jeopardy-playing supercomputer is now capable of beating human Jeopardy contestants on a regular basis, but has a ways to go before it takes on the likes...NetworkWorld From ACM News | February 11, 2010
Google said Wednesday that it would offer ultrahigh-speed Internet access in some communities in a test that could showcase the kinds of things that would be possible...The New York Times From ACM News | February 11, 2010
Communications networks' efficiency could be upgraded with a new network coding approach co-developed by researchers at MIT in which a router mathematically combines...MIT News From ACM TechNews | February 10, 2010
An Indian telecom company is deploying simple cell phone base stations that need as little as 50 watts of solar-provided power. It will soon announce plans to sell...Technology Review From ACM News | February 10, 2010
If wireless operators thought they'd faced a deluge of data traffic from the iPhone, they haven't seen anything yet, according to a survey from network equipment...CNET From ACM News | February 9, 2010
The Rugged Software Development Initiative (RSDI) was recently launched by security experts in an effort to ensure that the software writing process considers security...Dark Reading From ACM TechNews | February 8, 2010
LET'S face it: power cables are unsightly dust-traps. PCs, TVs and music players are becoming slicker every year, but the nest of vipers in the corner of everyAn...New Scientist From ACM News | February 8, 2010
Google engineers are working on a translator for Google Android smartphones to convert one language into another quickly enough to allow speakers without a common...Wired From ACM News | February 8, 2010
The National Science Foundation and the Microsoft Corporation have agreed to offer American scientific researchers free access to the company’s new cloud computing...The New York Times From ACM News | February 5, 2010
Engineers from NASA and General Motors have jointly developed what they tout as "the world's most dexterous robot" called "Robonaut2" to supplement human activity...MSNBC From ACM News | February 4, 2010
The world's largest Internet search company and the world's most powerful electronic surveillance organization are teaming up in the name of cybersecurity.
Under...The Washington Post From ACM News | February 4, 2010
A fan upgrade that will save Oak Ridge National Laboratory's computing complex $150,000 a year in energy costs is just the latest step by the laboratory to reduce...Oak Ridge National Laboratory From ACM News | February 4, 2010
The China-U.S. diplomatic spat over cyberattacks on Google has highlighted the growing significance of the Internet as a theater of combat.
Deputy Defense Secretary...Time From ACM News | February 3, 2010
Despite widespread speculation, nothing beyond what Steve Jobs announced last week is known about the A4 chip at the heart of the Apple iPad.
Jobs described the...Technology Review From ACM News | February 3, 2010