It's not easy to generate a string of numbers that lack any pattern or rule, or even to define exactly what randomness means.Gary Anthes From Communications of the ACM | April 1, 2011
Washington is in the process of deploying a statewide system that will provide early warnings about cybersecurity threats to participating organizations and the...Network World From ACM TechNews | March 10, 2011
If humans can't beat a computer at "Jeopardy!" why should we trust them to make the right call on fourth down in the Super Bowl? That was the fundamental question...Network World From ACM News | March 8, 2011
James Gleick's first chapter has the title "Drums That Talk." It explains the concept of information by looking at a simple example.The New York Review of Books From ACM News | February 28, 2011
He raised important public issues, such as the impact of computers and the Internet on society, and encouraged social responsibility for computer professionals....Samuel Greengard From Communications of the ACM | March 1, 2011
A presidential report asserts the value of U.S. government investments in the cross-agency Networking and Information Technology Research...Tom Geller From Communications of the ACM | March 1, 2011
Researchers are mining Twitter's vast flow of data to measure public sentiment, follow political activity, and detect earthquakes and flu outbreaks.Neil Savage From Communications of the ACM | March 1, 2011
Outreach programs and usability improvements are drawing many researchers to grid computing from disciplines that have not traditionally used such resources.Kirk L. Kroeker From Communications of the ACM | March 1, 2011
The Age of Data is just around the corner, right where it has been for years. As someone who spends a lot his time creating visualizations, I've been hoping for...Slate From ACM News | February 22, 2011
At the dawn of the modern computer era, two Pentagon-financed laboratories bracketed Stanford University. At one laboratory, a small group of scientists and engineers...The New York Times From ACM News | February 15, 2011
Intel researchers are developing computer security technology that stop all zero-day attacks. "We're going to see a quantum jump in the ability of future devices...Computerworld From ACM TechNews | February 1, 2011
More than 50 years of computing literature is augmented, streamlined, and joined to powerful new tools for retrieval and analysis.Gary Anthes From Communications of the ACM | February 1, 2011
Crowdsourcing is based on a simple but powerful concept: Virtually anyone has the potential to plug in valuable information.Samuel Greengard From Communications of the ACM | February 1, 2011
Computer science has lost not only a great scientist, but an important link to the electronic computing revolution that took place in the 1940s.Leah Hoffmann From Communications of the ACM | February 1, 2011
Purdue University's Science of Information Center seeks new principles to answer the question 'What is information?'Neil Savage From Communications of the ACM | February 1, 2011
Power-saving processor algorithms have the potential to create significant energy and cost savings.Gregory Goth From Communications of the ACM | February 1, 2011
Advanced internet technologies, energy management and the smart grid are coming together in an unlikely location: a mid-sized city in the South.Wired From ACM News | January 24, 2011
The U.S. Department of Energy's Lawrence Berkeley National Laboratory has started working with China to improve the energy performance of its data centers.Lawrence Berkeley National Laboratory From ACM News | January 4, 2011