The development of a framework for building cloud computing infrastructure could improve high-performance computing services from the Internet to multiple clients...Australian IT From ACM TechNews | May 20, 2009
ACM's Special Interest Group on Algorithms and Computing Theory (SIGACT) and the European Association for Theoretical Computer Science have awarded the Godel Prize...AScribe Newswire From ACM TechNews | May 20, 2009
You just landed in Seattle for a meeting later this afternoon. But first, you've got to pick up your rental car, grab a hot cup of coffee and probably spend a fair...Webmonkey From ACM News | May 20, 2009
The European WATCH-OVER Project has developed a system capable of monitoring vulnerable road users (VRUs) that features a pre-crash system and a warning system....ICT Results From ACM TechNews | May 19, 2009
Ubiquitous wireless networks, sustainable data centers, the development of the smart energy grid, and the commonality of city-supplied social networks are bringing...Computerworld From ACM TechNews | May 18, 2009
Three-dimensional (3D) television and film has been a niche application partly because of cost, but mobile devices equipped with simpler and less expensive 3D technology...ICT Results From ACM TechNews | May 18, 2009
Entertainment businesses say digital rights management prevents the theft of their products, but access control technologies have been a uniform failure when it...Leah Hoffmann From Communications of the ACM | June 1, 2009
Medical researchers have long dreamed of "magic bullets" that go directly where they are needed. Now micromedicine and nanotechnology are making a range of molecules...Don Monroe From Communications of the ACM | June 1, 2009
A recently published report from the National Research Council (NRC) contends that there has to be more public disclosure and informed debate about cyberarms and...Network World From ACM TechNews | May 15, 2009
The U.S. House of Representatives passed H.R. 2020, the Networking and Information Technology Research and Development Act of 2009 by a voice vote on Tuesday (May...House Committee on Science and Technology From ACM News | May 15, 2009
Forget the battlefield radios, the combat PDAs or even infantry hand signals. When the soldiers of the future want to communicate, they’ll read each other's minds...Wired From ACM News | May 15, 2009
Google has revealed an array of new search tools--Search Options, Wonder Wheel, Rich Snippets, and Google Squared--that enable users to combine options for displaying...TechNewsWorld From ACM TechNews | May 14, 2009
Researchers at the Georgia Institute of Technology have built a test facility to evaluate and enhance sensors designed to detect buried land mines. The unique automated...Newswise From ACM News | May 14, 2009
The EUREKA ITEA software Cluster ANSO project is working to integrate domestic networked multimedia, home control, and communications devices. The digital home...EUREKA From ACM TechNews | May 13, 2009
As the expiration of ICANN's agreement with the U.S. Commerce Department approaches, stakeholders are weighing in on the fate of the organization. European Union...InternetNews.com From ACM TechNews | May 13, 2009
Office workers who make time to chat face to face with colleagues may be far more productive than those who rely on e-mail, the phone, or Facebook, suggests a study...Technology Review From ACM News | May 14, 2009
Light switches, TV remote controls and even house keys could become a thing of the past thanks to brain-computer interface (BCI) technology being developed in Europe...ICT Results From ACM News | May 13, 2009
Researchers at the University of Science and Technology of China say they have developed the first optical quantum cryptography network. The quantum communication...Chinese Academy of Sciences From ACM TechNews | May 13, 2009
The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...The New York Times From ACM TechNews | May 13, 2009
A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...The New York Times From ACM News | May 13, 2009