Organizations globally hold approximately 2.2 zettabytes of data and spend roughly $1.1 trillion to secure and provide access to it, according to a new Symantec...Network World From ACM TechNews | July 5, 2012
A recent hearing of the U.S. House of Representative's Subcommittee on Technology and Innovation focused on ways to enhance collaboration between commercial and...Network World From ACM TechNews | June 26, 2012
The U.S. Defense Advanced Research Projects Agency recently launched the Quiness program, which aims to demonstrate that quantum communications can generate secure...Network World From ACM TechNews | May 22, 2012
The U.S. Army Research Laboratory has awarded a $1.4 million contract to a team that plans to develop software that can automatically recognize metaphorical speech...Network World From ACM TechNews | May 15, 2012
Although many companies are hoping that mobile payments enabled by near-field communications technology will catch on among consumers, the technology's impact will...Network World From ACM TechNews | May 3, 2012
People with Linux skills and experience have a good chance of finding a Linux job, or landing a better position. Network World From ACM TechNews | April 19, 2012
A new research center is developing a comprehensive intellectual framework for software-defined networking. Network World From ACM TechNews | April 12, 2012
Open source code libraries have a significant number of security vulnerabilities, according to an Aspect Security study that analyzed 113 million software downloads...Network World From ACM TechNews | March 29, 2012
The Internet Engineering Task Force is considering approving the Simple Cloud Identity Management scheme, which manages user identity in cloud-based applications...Network World From ACM TechNews | March 15, 2012
DARPA will launch the Zero Robotics Autonomous Space Capture Challenge on March 28, a contest that asks participants to develop unique algorithms to control small...Network World From ACM TechNews | March 12, 2012
The $25 Raspberry Pi computer could have an impact far beyond the educational sector, with early production runs showing significant demand for the technology....Network World From ACM TechNews | March 9, 2012
MIT researchers are studying how to build a cloud computing infrastructure that recognizes and eliminates a cyberattack under normal operating procedures. Network World From ACM TechNews | February 29, 2012
The International Center for Radio Astronomy Research is working with the Canadian Astronomical Data Center to develop systems that will work with the Square Kilometer...Network World From ACM TechNews | February 28, 2012
A dramatic shift in how robots are made and perceived is leading to their widespread adoption and use. Network World From ACM TechNews | February 22, 2012
Researchers at the universities of York and Nijmegen have developed a method for accelerating data storage hundredfold. Network World From ACM TechNews | February 13, 2012
Data routinely gathered in Web logs, such as IP address, cookies, operating systems, browser type, and user-agent strings can threaten online privacy because they...Network World From ACM TechNews | February 6, 2012
U.S. Defense Advanced Research Projects Agency researchers are developing security technologies that go beyond recognizing complex passwords. Network World From ACM TechNews | January 25, 2012
U.S. companies are locating more of their research and development operations overseas, and Asian countries are rapidly increasing investments in their own science...Network World From ACM Careers | January 20, 2012
Password use needs an overhaul that is driven by understanding the damage that can be done when password security is compromised, and researchers need to quantify...Network World From ACM TechNews | January 6, 2012