Privacy is lost in the proliferation of technology's omnipresent accessibility.
The information age has generated its fair share of new statutes, some of which may be considered criminal.
Are we dealing with an autonomous virtual realm or merely with an aspect of the mental realm?
Why the ACM Council does not support the licensing of software engineers at this time.
Imagine waking in the morning, turning on your interactive TV, and being greeted by your intelligent news agent. Your agent has spent the night digitizing, segmenting, indexing, extracting, translating, and summarizing the world's …
Deconstructing broadcast news using all sources of input from the multimedia stream.
Increasing the usefulness of extracted information.
Transcribing speech and making it ready for browsing.
Combining technologies to achieve performance exceeding the sum of the parts.
Automatically keeping up-to-date with rapidly changing news broadcasts.
Developing a system for close-captioning and automatic information extraction for Japanese broadcast news speech.
How the National Institute of Standards and Technology provides a basis for evaluating these novel systems.
Strategic motivations range from adding local access to long-distance services, to sewing up millions of new customers, to claiming a piece of a potentially hot new technology.
When it comes to working biometric identification technologies, it's not only our fingerprints that do the talking. Now, our eyes, hands, signature, speech, and even facial temperature can ID us.
IT managers commiserate over the challenges of convincing senior executives that, contrary to popular belief, outsourcing isn't always a money-saving option.
Need to decide whether developing a Web site or service is worth the financial investment and the trouble? Use this model to calculate the payoff. And get in (at the right level) while you can.