Effective August 6, 2011, IBM terminated its contract with the University of Illinois to provide the supercomputer for the National Center for Supercomputing...National Center for Supercomputing Applications From ACM News | August 9, 2011
It’s not unusual for system administrators to spend long days in the office—and even wind up sleeping in them overnight. Or get paged at 2 A.M. or on Thanksgiving...Samuel Greengard From ACM News | August 9, 2011
A multidisciplinary team at Ben-Gurion University of the Negev has developed a desktop Webcam tool that could help improve the ergonomic posture of office workers...Ben-Gurion University of the Negev From ACM TechNews | August 8, 2011
The Fraunhofer Institute's Barbara Krausz has developed a system for determining when crowds have become too large by observing the way people sway slowly from...New Scientist From ACM TechNews | August 8, 2011
The U.S. Defense Advanced Research Projects Agency (DARPA) recently launched Cyber Fast Track, a program that will fund innovative cybersecurity efforts by groups...InformationWeek From ACM TechNews | August 8, 2011
For most of us, the closest we get to a robot in daily life is a Roomba. But Dr. Cynthia Breazeal, director of the Personal Robots Group at the MIT Media Lab...Slate From ACM News | August 8, 2011
Why are the Feds hobnobbing with hackers? Defcon, a convention of computer hackers here, was crawling with federal agents on Friday. They smiled, shook hands,...The New York Times From ACM News | August 6, 2011
China basked in a moment of technological glory last November when it nudged out the U.S. as home of the world's fastest supercomputer. The achievement was short...National Public Radio From ACM News | August 5, 2011
Tucked away here in the Mojave Desert, the assembly plant for the high-flying Global Hawk jet resembles a giant hobby shop. Work tables surround a handful of...The New York Times From ACM News | August 5, 2011
Jeffrey Carr, author of O'Reilly Media's Inside Cyber Warfare, argues that McAfee's supposed revelations about large-scale Chinese hacking attacks are a smokescreen...China Daily From ACM News | August 5, 2011
Anybody involved in the IT and cybersecurity industry knows that every major industry and government agency around the world is under threat of intrusion through...ReadWriteWeb From ACM News | August 5, 2011
Eight interdisciplinary groups of digital humanists recently met to discuss the results of research on London's Old Bailey courthouse's digitized archive. The...ScienceNews From ACM TechNews | August 4, 2011
A security researcher has uncovered a slew of vulnerabilities in Siemens industrial control systems, including a hard-coded password, that would let attackers...Wired From ACM News | August 4, 2011
It happens every summer. In the weeks after the annual National College Entrance Examination, new high school graduates wait for the list. For years, who gets...Time From ACM News | August 4, 2011
China was probably the world's earliest technological superpower, inventing the plow, the compass, gunpowder, and block printing. Then, science in the Middle...National Public Radio From ACM News | August 4, 2011
The Pentagon is developing plans to use social networking sites like Facebook and Twitter as both a resource and a weapon in future conflicts. Its research and...The New York Times From ACM News | August 3, 2011
The word "hacker" evokes all kinds of scary images. But Jeff Moss says hackers are exactly what the world needs more of, because they can make the Internet safer...CNN From ACM News | August 3, 2011
Carnegie Mellon University (CMU) researchers are studying how facial-recognition tools can be detrimental to privacy. In a recent test, the researchers were...The Wall Street Journal From ACM TechNews | August 1, 2011
Someone types a command into a laptop, and Actroid-DER jerks upright with a shudder and a wheeze. Compressed air flows beneath silicone skin, triggering actuators...National Geographic From ACM News | August 2, 2011