Researchers at the University of Washington and Cornell University are working on the mobileASL project, which is developing a mobile phone that would enable deaf...IEEE Spectrum From ACM TechNews | March 23, 2009
China-based hackers breached the office computers of Democratic Sen. Bill Nelson of Florida, the senator's office confirmed March 20. In three separate attacks,...CQ Politics From ACM News | March 23, 2009
Research teams from the Ecole Polytechnique Federale de Lausanne in Switzerland and Inverse Path say they have discovered new techniques to read what a person is...IDG News Service From ACM TechNews | March 19, 2009
The personal computer (PC) is expected to advance in both intelligence and form factor over the next 10 years, evolving into a merger of computing devices and peripherals...Computerworld From ACM TechNews | March 18, 2009
Carnegie Mellon University (CMU) engineers Priya Narasimhan and Rajeev Gandhi have led the development of YinzCam, a large-scale mobile wireless video service designed...Carnegie Mellon News From ACM TechNews | March 16, 2009
Henry Tirri, Nokia's head of research, says the economic downturn will lead to more investments in collaboration tools, broadband, video, and mobile technology...Financial Times - Digital Business From ACM TechNews | March 13, 2009
Scratch, created by the Lifelong Kindergarten group at the Massachusetts Institute of Technology's Media Lab, is a programming environment for creating interactive...Wired News From ACM TechNews | March 12, 2009
Microsoft technical fellow Butler Lampson, Google chief Internet evangelist Vinton Cerf, and Qualcomm chairman Irwin Jacobs discussed the past, present, and potential...Stanford Report (CA) From ACM TechNews | March 9, 2009
The future Internet promises to link electronics, clothing, cars and pretty much everything in between. The upshot will be a network that can accompany and support...ICT Results From ICT Results | March 9, 2009
Although some countries have far more broadband-connected homes and higher broadband speeds than the United States, the U.S. leads the world in putting broadband...The New York Times From ACM TechNews | February 27, 2009
On the 40th anniversary of Douglas C. Engelbart's "The Mother of All Demos," computer scientists discuss the event's influence — and imagine what could have been...Karen A. Frenkel From Communications of the ACM | March 1, 2009
Virtualization is moving out of the data center and making inroads with mobile computing, security, and software delivery.Kirk L. Kroeker From Communications of the ACM | March 1, 2009
Researchers are turning to computers to help us take advantage of our own cognitive abilities and of the wisdom of crowds.Leah Hoffmann From Communications of the ACM | March 1, 2009
Advanced computational models are enabling researchers to create increasingly sophisticated prediction markets.Gregory Goth From Communications of the ACM | March 1, 2009
Dalhousie University professor Aaron Newman, the Canada Research Chair in Cognitive Neuroscience, is using motion capture technology to develop a more thorough...Newswise From ACM TechNews | February 23, 2009
Digital rights management (DRM) has emerged as a widespread tool to combat piracy. So far, however, DRM systems have proved highly inconvenient to consumers who...Samuel Greengard From ACM News | February 20, 2009
The Fraunhofer Institute for Communications Systems ESK's Elephant research project is a software platform that makes it easier for programmers to develop applications...Fraunhofer Institute From ACM TechNews | February 20, 2009
Microsoft researcher Gordon Bell has been recording virtually all aspects of his life digitally for 10 years through his Microsoft-funded MyLifeBits project. He...ZDNet From ACM TechNews | February 19, 2009
University of Michigan professor Elliot Soloway and University of North Texas professor Cathleen Norris have developed the Mobile Learning Environment, a suite...niversity of Michigan News Service From ACM TechNews | February 18, 2009
A security expert at the recent Black Hat DC computer security conference demonstrated a technique for attacking the Mac operating system OS X without leaving any...Technology Review From ACM TechNews | February 19, 2009