A series of online attacks on Google and dozens of other American corporations have been traced to computers at two educational institutions in China, including...The New York Times From ACM News | February 19, 2010
Your child comes home from pre-K and tells you to shut off the lights to save electricity. Don't feel scolded; your child may be a budding scientist. To support...By Ismini Scouras From ACM News | February 18, 2010
Nathan Myhrvold wants to shake up the marketplace for ideas. His mission and the activities of the company he heads, Intellectual Ventures, a secretive $5 billion...The New York Times From ACM News | February 18, 2010
Cyber-security first responders will be put to the test in an upcoming training-and-competition event hosted by Los Alamos and Sandia national laboratories. Federal...Los Alamos National Laboratory From ACM News | February 18, 2010
Google may be earning $500 million a year via companies and individuals who register deceptive Web site addresses. The claim centers on a controversial scheme known...New Scientist From ACM News | February 18, 2010
UT Southwestern Medical Center surgeons completed the North Texas region's first robot-assisted bladder removal using the DaVinci system, a four-armed robot controlled...T Southwestern Medical Center From ACM News | February 18, 2010
More than 75,000 computer systems at nearly 2,500 companies in the United States and around the world have been hacked in what appears to be one of the largest...The Washington Post From ACM News | February 18, 2010
There are bold programmers but no old programmers. That fear-tinged saying echoes even more today among software developers, who fear the recession provides a handy...InfoWorld From ACM Careers | February 18, 2010
The Bipartisan Policy Center recently staged the Cyber ShockWave, a simulation to demonstrate the plausibility of a cyberattack that could be as crippling as the...The Washington Post From ACM TechNews | February 17, 2010
A recent University of California, Los Angeles survey found that more students are interested in majoring in science and technology fields, but those students are...Inside Higher Ed From ACM TechNews | February 17, 2010
University of California, Berkeley researchers have created energy-scavenging nanofibers that can be woven into clothing and textiles. The nano-sized generators...C Berkeley News From ACM TechNews | February 17, 2010
Right now, troops trying to listen in on enemy chatter rely on a convoluted process. They tune into insurgency radio frequencies, then hand the radio over to local...Wired From ACM News | February 17, 2010
Transfers of large amounts of data across the Internet to wireless devices suffer from a key problem: The Transmission Control Protocol (TCP) used to send and receive...Technology Review From ACM News | February 16, 2010
Unknown hackers have taken out U.S. cellphone networks in an ongoing cyber-attack that will soon knock out parts of the nation's electricity grid – say the officials...New Scientist From ACM News | February 16, 2010
Northeastern University (NU) professor Alan Mislove has developed an algorithm that can predict the personal information of any given Facebook user in the Rice...Northeastern niversity News From ACM TechNews | February 16, 2010
Emergency management and transport agencies along the Mid-Atlantic coping with the recent blizzards used an advanced visualization and data fusion system that put...niversity of Maryland, College Park From ACM News | February 16, 2010
By taking advantage of a phenomenon that until now has been a virtual showstopper for electronics designers, a team led by Oak Ridge National Laboratory's Panos...Oak Ridge National Laboratory From ACM News | February 16, 2010
It all started with a brawny, tattooed building contractor with a passion for exotic animals. He was taking biology classes at City College of San Francisco, a...The New York Times From ACM News | February 12, 2010
Future cars will have even more complex electronics and robotic-like control systems that monitor driving conditions and assist drivers, but experts say that will...NPR Online From ACM TechNews | February 12, 2010
Australia's federal government has been given sensitive data from utilities, banks, and other organizations for the Critical Infrastructure Protection Modeling...Computerworld Australia From ACM TechNews | February 12, 2010