A recently published report from the National Research Council (NRC) contends that there has to be more public disclosure and informed debate about cyberarms and...Network World From ACM TechNews | May 15, 2009
The U.S. House of Representatives passed H.R. 2020, the Networking and Information Technology Research and Development Act of 2009 by a voice vote on Tuesday (May...House Committee on Science and Technology From ACM News | May 15, 2009
Forget the battlefield radios, the combat PDAs or even infantry hand signals. When the soldiers of the future want to communicate, they’ll read each other's minds...Wired From ACM News | May 15, 2009
Google has revealed an array of new search tools--Search Options, Wonder Wheel, Rich Snippets, and Google Squared--that enable users to combine options for displaying...TechNewsWorld From ACM TechNews | May 14, 2009
Researchers at the Georgia Institute of Technology have built a test facility to evaluate and enhance sensors designed to detect buried land mines. The unique automated...Newswise From ACM News | May 14, 2009
The EUREKA ITEA software Cluster ANSO project is working to integrate domestic networked multimedia, home control, and communications devices. The digital home...EUREKA From ACM TechNews | May 13, 2009
As the expiration of ICANN's agreement with the U.S. Commerce Department approaches, stakeholders are weighing in on the fate of the organization. European Union...InternetNews.com From ACM TechNews | May 13, 2009
Office workers who make time to chat face to face with colleagues may be far more productive than those who rely on e-mail, the phone, or Facebook, suggests a study...Technology Review From ACM News | May 14, 2009
Light switches, TV remote controls and even house keys could become a thing of the past thanks to brain-computer interface (BCI) technology being developed in Europe...ICT Results From ACM News | May 13, 2009
Researchers at the University of Science and Technology of China say they have developed the first optical quantum cryptography network. The quantum communication...Chinese Academy of Sciences From ACM TechNews | May 13, 2009
The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...The New York Times From ACM TechNews | May 13, 2009
A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...The New York Times From ACM News | May 13, 2009
In an interview with the San Francisco Chronicle, ICANN president Paul Twomey agreed with European Union commissioner Viviane Reding, who recently called on President...San Francisco Chronicle From ACM TechNews | May 12, 2009
University of Michigan professor Alex Halderman wants to research whether the anti-piracy software built into computer games makes computers more vulnerable to...niversity of Michigan News Service From ACM TechNews | May 11, 2009
Yale University researchers Eugenio Culurciello and Andreas Savvides are developing smart camera technology to help monitor older adults who live alone. "Approximately...Yale University From ACM TechNews | May 11, 2009
Throughout the U.S. military there is heightened awareness that the threat of a computer attack is just as urgent as a physical attack, and that military units...The New York Times From ACM TechNews | May 11, 2009
The European Commission is proposing that the European Union's consumer protections for physical products also cover software. Commissioners Viviane Reding and...ZDNet UK From ACM TechNews | May 11, 2009
Cloud computing is a hot topic in the technology world these days, called by television and business magazines the way of the future. While it's difficult to predict...National Science Foundation From ACM News | May 11, 2009
Inderscience PublishersSocial Design Group's Yoshiharu Maeno and University of Tokyo professor Yukio Ohsawa have developed a new approach to analyzing social networks...ScienceDaily From ACM TechNews | May 8, 2009
University of California-Santa Barbara (UCSB) researchers temporarily commandeered an infamous botnet known for stealing financial data and found that the threat...Dark Reading From ACM TechNews | May 8, 2009