While some of the latest government wage data appears to show that Silicon Valley's high-tech workers are making more now than they did in 2000, a closer look at...The Wall Street Journal From ACM News | February 3, 2010
count likely knows that police can peek inside it if they have a paper search warrant.
But cybercrime investigators are frustrated by the speed of traditionalone...CNET From ACM News | February 3, 2010
The China-U.S. diplomatic spat over cyberattacks on Google has highlighted the growing significance of the Internet as a theater of combat.
Deputy Defense Secretary...Time From ACM News | February 3, 2010
Despite widespread speculation, nothing beyond what Steve Jobs announced last week is known about the A4 chip at the heart of the Apple iPad.
Jobs described the...Technology Review From ACM News | February 3, 2010
U.S. President Barack Obama has proposed spending $3.7 billion on science, technology, engineering, and math education in his 2011 budget, including increasing...Information Week From ACM TechNews | February 3, 2010
Britain's Women in Technology has teamed up with the National IT Learning Center to introduce the Rise of the Cyberella Competition, which will provide funding...V3.co.uk From ACM TechNews | February 3, 2010
Boston University researchers have developed a method for studying and identifying hubs within social networks. The approach emphasizes the location of the individual...Technology Review From ACM TechNews | February 3, 2010
Military agencies wanted a death ray, and they were willing to pay for it. That was one of the forces spurring scientists in a race that ended with the invention...American Institute of Physics From ACM News | February 3, 2010
Iowa investigators suspect a serious breach of a state government computer database last week originated in China. The hackers gained access to a computer system...The Des Moines Register From ACM News | February 3, 2010
Looking like a robotic mule, the Legged Squad Support System (LS3) being developed by the Defense Advanced Research Projects Agency will carry 400 pounds of equipment...Defense Industry Daily From ACM News | February 2, 2010
For a company that makes no products, Acacia Research spends a lot of time fighting over patents in court. Acacia has filed at least 337 patent-related lawsuits...BusinessWeek From ACM News | February 2, 2010
Why is the National Science Foundation helping Morehouse College pay students to test videogames? The school's Glitch Game Testers program is one of many NSF efforts...By Paul Hyman From ACM News | February 2, 2010
Painting the roofs of buildings white has the potential to significantly cool cities and mitigate some impacts of global warming, a new study indicates. The research...National Center for Atmospheric Research From ACM News | February 2, 2010
The recent hacking attack that prompted Google's threat to leave China is underscoring the heightened dangers of previously undisclosed computer security flaws...The Associated Press From ACM News | February 2, 2010
With a few quick keystrokes, a computer hacker who goes by the code name Majia calls up a screen displaying his latest victims. He operates secretly and illegally...The New York Times From ACM News | February 2, 2010
Being hacked by a robot requires much less hardware than I expected. There’s no need for virtual-reality goggles or 3D holograms. There are no skullcaps studded...Popular Mechanics From ACM News | February 1, 2010
A recent Lemelson-MIT Invention Index survey found that teens are enthusiastic about science, technology, engineering, and mathematics (STEM), with 77 percent interested...Lemelson-MIT Program From ACM TechNews | February 1, 2010
The situation was desperate for the Denver Broncos. On the first Sunday of the National Football League’s 2009 season, with only 28 seconds left in the game, they...Wired From ACM News | February 1, 2010
A Chinese military expert Sunday (January 31) refuted claims by the U.K.'s national security intelligence agency that China has engaged in commercial espionage,...Global Times From ACM News | February 1, 2010
In computing, the vision always precedes the reality by a decade or more. The pattern has held true from the personal computer to the Internet, as it takes time...The New York Times From ACM News | February 1, 2010