The obsolescence of graphics-processing clusters is being hastened by the rapidly accelerating data processing speed of supercomputers. Scientists at Argonne National...Technology Review From ACM TechNews | August 10, 2009
Application programming interfaces (APIs), software specifications that allow Web sites and services to interact with each other, have been a major factor in the...Technology Review From ACM TechNews | August 7, 2009
Two programmers have hacked the World of Warcraft online game environment with a set of programs that automate in-game characters, which game developer Blizzard...Technology Review From ACM TechNews | August 6, 2009
ACM's SIGGRAPH 2009 conference will showcase a quintet of innovative interface models. University of Tokyo researchers have created a touchable holographic interface...Technology Review From ACM TechNews | August 5, 2009
True Engineering Technology has developed semantic technology that gives meaning to numerical data to prevent number-related mixups. The company has launched Numberspace...Technology Review From ACM TechNews | July 30, 2009
A consortium that includes the Center for Strategic and International Studies, the SANS Institute, and the U.S. Department of Defense aims to cultivate a new generation...Technology Review From ACM TechNews | July 24, 2009
Columbia University robotics researchers Peter Allan and Matei Ciocarlie have developed a new way to control a dexterous robotic hand. The researchers realized...Technology Review From ACM TechNews | July 20, 2009
New research on online dating sites shows that users can experience "cognitive overload" when faced with too many choices, causing them to make poorer decisions...Technology Review From ACM TechNews | July 17, 2009
Indiana University researchers have exposed some of the methods spammers use to collect email addresses and send junk mail through multiple computers. In a paper...Technology Review From ACM TechNews | July 15, 2009
Juniper security researcher Barnaby Jack canceled plans for a live demonstration of the insecurity of automatic teller machines (ATMs) at the upcoming Black Hat...Technology Review From ACM TechNews | July 9, 2009
When a cell phone or credit-card bill arrives, each call or purchase is itemized, making it possible to track trends in calling or spending. Within the next few...Technology Review From ACM News | June 30, 2009
Researchers from the College of William & Mary have developed real-time collaborative browsing (RCB) software that makes it easier for users to interact with each...Technology Review From ACM TechNews | June 24, 2009
A cell phone would be able to track the behavior of its user with SoundSense, new software developed by Dartmouth College researchers. SoundSense automatically...Technology Review From ACM TechNews | June 22, 2009
University of Washington researchers have developed an automated information extraction software engine that mines meaning out of more than 500 million Web pages...Technology Review From ACM TechNews | June 10, 2009
Fraunhofer Institute for Photonic Microsystems researchers have developed a new screen technology that uses interlacing photodetector cells and display pixels to...Technology Review From ACM TechNews | June 5, 2009
The screens on many mobile phones can leave a user feeling distinctly vision impaired, especially if her attention is divided between tapping virtual buttons and...Technology Review From ACM News | June 2, 2009
Researchers at Rutgers University's Winlab and NEC Laboratories have developed R2D2, a system designed to improve Wi-Fi wireless Internet access when traveling....Technology Review From ACM TechNews | May 29, 2009
IBM researchers are developing Watson, a natural-language processing system that will compete against human players in a game of Jeopardy! Demonstrations of the...Technology Review From ACM TechNews | May 27, 2009
University of Calgiari researcher Michele Marchesi and colleagues have developed a way that software developers can allocate resources to error correction. Marchesi...Technology Review From ACM TechNews | May 21, 2009
The "secret questions" that protect online accounts and passwords may be far less secure than commonly believed, largely because their answers are often far too...Technology Review From ACM TechNews | May 18, 2009