How do you parse a tweet? Five years ago, that question would have been gibberish. Today, it's perfectly sensible, and it's at the front of Amit Singhal's mind....Technology Review From ACM News | April 20, 2010
An international group of computer scientists, law professors, military leaders, and others recently met at Russia's Moscow State University for a conference on...Technology Review From ACM TechNews | April 16, 2010
Researchers at Vanderbilt University have created an algorithm designed to protect the privacy of patients while maintaining researchers' ability to analyze vast...Technology Review From ACM News | April 13, 2010
When the stimulus bill passed last year--allocating $20 billion to help doctors and hospitals adopt electronic medical records (EMRs)--many scientists were excited...Technology Review From ACM News | April 6, 2010
Engineers have developed new transistors that can locate hardware bugs in a fraction of the time it takes to perform normal debugging. Technology Review From ACM TechNews | April 5, 2010
Thanks to smart phones and other mobile devices, the number of applications that make use of geolocation data is exploding. But developers and device makers face...Technology Review From ACM News | March 8, 2010
SRI International and Georgia Tech researchers have developed Block All Drive-By Download Exploits (BLADE), free software that can stop Internet attacks brought...Technology Review From ACM TechNews | February 24, 2010
Transfers of large amounts of data across the Internet to wireless devices suffer from a key problem: The Transmission Control Protocol (TCP) used to send and receive...Technology Review From ACM News | February 16, 2010
A wireless network that uses reflected infrared light instead of radio waves has transmitted data through the air at a speed of one gigabit per second—six to 14...Technology Review From ACM News | February 11, 2010
Over the last few years, scientists have discovered hundreds of genetic variants linked to disease. But the vast majority of that research has focused on people...Technology Review From ACM News | February 8, 2010
Despite widespread speculation, nothing beyond what Steve Jobs announced last week is known about the A4 chip at the heart of the Apple iPad.
Jobs described the...Technology Review From ACM News | February 3, 2010
Today's stock market has become a world of automated transactions executed at lightning speed. This high-frequency trading could make the financial system more...Technology Review From ACM News | December 23, 2009
Researchers at IBM Thomas J. Watson Research Center and IBM Research-Zurich have developed a cloud computing security system that makes elements of the cloud act...Technology Review From ACM TechNews | November 20, 2009
Scientists at Microsoft research have unveiled Ripley, a new way to secure complex Web applications by effectively cloning the user's browser and running it remotely...Technology Review From ACM TechNews | November 10, 2009
Massachusetts Institute of Technology researchers led by professor Martin Rinard have developed ClearView, software capable of finding and fixing certain types...Technology Review From ACM TechNews | November 2, 2009
Security researchers at Cryptography Research say the smart card attack involving differential power analysis could be used to target smartphones. Cryptography...Technology Review From ACM TechNews | October 27, 2009
A new study by researchers from the Massachusetts Institute of Technology (MIT) and the University of California, San Diego (UCSD) suggests that leading cloud-computing...Technology Review From ACM TechNews | October 23, 2009
The way signal strength varies in a wireless network can reveal what's going on behind closed doors.
It's every schoolboy's dream: an easy way of looking through...Technology Review From ACM News | October 1, 2009
Google developed a new approach to mobile phone security with its open source Android operating system. Android developer Rich Cannings says there must be a balance...Technology Review From ACM TechNews | August 18, 2009
At the 9th annual Privacy Enhancing Technologies Symposium, security researchers discussed alternatives to existing systems designed to help Internet users maintain...Technology Review From ACM TechNews | August 13, 2009