IBM will pay $1.5 billion to Globalfoundries in order to shed its costly chip division. According to IBM Director of Research John E. Kelly III in an interview Monday, handing over control of the semiconductor operations will allow it to grow faster, while IBM continues to invest in and expand its chip research. Privately held Globalfoundries will get IBM's global commercial semiconductor technology business.
It's a tough challenge for the National Football League to entice fans off their comfy couches and into stadiums when ticket prices are almost as high as the sport's TV ratings. Equipped with lots of technology, fans at home can watch multiple games on Sunday from the couch. So when the owners of the San Francisco 49ers drew up plans for the team's new $1.3 billion stadium, they tapped the ingenuity surrounding their Silicon Valley home.
A renowned technology hub that is home to some of the country's top universities, Boston is emerging as an unlikely battleground for web-based businesses like Airbnb and Uber, with some saying more regulations are needed to prevent the upstarts from disrupting more established industries. Cities like Boston have been wrestling with the same questions and developing solutions ranging from outright bans to minimum safety requirements.
In support of the National Cybersecurity Center of Excellence, NIST has awarded a contract its first Federally Funded Research and Development Center (FFRDC). The contract, which includes three initial tasks totaling about $29 million, was awarded to The MITRE Corporation, a not-for-profit organization that operates six other FFRDCs.
Imagine being able to switch out the batteries in electric cars just like you switch out batteries in a photo camera or flashlight. Engineers in California are trying to accomplish just that, in partnership with a local San Diego engineering company. Rather than swapping out the whole battery, which is cumbersome and requires large, heavy equipment, engineers plan to swap out and recharge smaller units within the battery, known as modules.
A habitual party crasher, Apple has a history of arriving late and making a big splash in various gadget categories. But can it continue with the Apple Watch? Smartwatches have been around for a few years, but makers such as Samsung and Sony have failed to make them a runaway hit. Apple's Watch won't go on sale until early 2015 and raises questions: Can the company work its magic as it has in the past?
Apple is betting that people want to pay with a tap of the phone rather than a swipe of the card. The technology company on Tuesday introduced a new digital wallet service called Apple Pay that is integrated with its Passbook credential-storage app and its fingerprint ID security system. The announcement came as Apple introduced several new products including a new, larger iPhone 6 and a watch.
An ambitious health startup from Google is teaming up with biotechnology drugmaker AbbVie in a $500 million joint venture that will try to develop new ways to treat cancer and other diseases such as Alzheimer's. The alliance announced Wednesday calls for Google Inc. and AbbVie Inc. to each invest $250 million in the project. An additional $1 billion may be poured into the project.
Advances in artificial intelligence and robotics mean that machines will soon be able to do many of the tasks of today's workers. But David Hummels, a professor of economics at Purdue Univ., says humans still have a unique advantage that machines may never be able to emulate: our ability to respond to other humans.
A new white paper from Decision Lens teaches how world-class innovation teams create standard frameworks to evaluate and prioritize the strategic investments that deliver the highest returns on investment, streamlining and accelerating the R&D portfolio planning process.
Bridges become an infrastructure problem as they get older, as de-icing salt and carbon dioxide gradually destroy the reinforced concrete. A new robot called C2D2 (Climbing Corrosion Detecting Device) is now in use in Switzerland and can check the condition of these structures, even in places that people cannot reach.
Researchers in Switzerland have created an Android app which lets users get together to crack a modern cryptographic code. Building on earlier work that used a network of 300 PlayStation consoles, the scientists decided to leverage the power of smartphones. By running the algorithm a very large number of times the code may be broken eventually.
The future of movie, sports and concert broadcasting lies in 4K definition, which will bring cinema quality TV viewing into people’s homes. With its 3840 x 2160 resolution, 4K Ultra HD has four times as many pixels as today’s Full HD. The new HEVC video compression standard now allows broadcasters to transmit live video in the 4K digital cinema standard, and was used recently to broadcast a soccer game in Germany.
Port scanners are programs that search the Internet for systems that exhibit potential vulnerabilities. According to report published online, Hacienda is one such port scanning program. The report says that this program is being put into service by the "Five Eyes," a federation of Western secret services. Scientists have developed free software that can help prevent this kind of identification and thus the subsequent capture of systems.
Chip designers are facing both engineering and fundamental limits that have become barriers to the continued improvement of computer performance. Have we reached the limits to computation? In a review article in Nature, Igor Markov of the Univ. of Michigan reviews limiting factors in the development of computing systems to help determine what is achievable, identifying "loose" limits and viable opportunities for advancements.
Russian hackers have stolen 1.2 billion user names and passwords in a series of Internet heists affecting 420,000 websites, according to a report published Tuesday. The thievery was described in a New York Times story based on the findings of Hold Security, a Milwaukee firm that has a history of uncovering online security breaches. For confidentiality reasons, the identities of the affected websites weren't identified by the Times.
In 2006, DARPA launched a long-term project called CORONET, which sought to develop a cloud-based technology that could enable affordable, fast bandwidth and ensure the survival of cloud networks in the event of system-wide failures. After years of work, scientists from AT&T, IBM and Applied Communication Sciences have announced a proof-of-concept technology that reduces setup times for cloud-to-cloud connectivity from days to seconds.
Apple is teaming up with former nemesis IBM to work together on about 100 different mobile applications in an attempt to sell more iPhones and iPads to corporate customers and government agencies. The applications, expected to be released this fall, will feature some of data-crunching tools that IBM Corp. sells to companies trying to get a better grasp on their main markets while scouring for new money-making opportunities.
The doubling of transistors on a microprocessor occurs roughly every two years, and is the outcome of what is called Moore’s Law. In a bid to continue this trend of decreasing transistor size and increasing computation and energy efficiency, chip-maker Intel has partnered with Lawrence Berkeley National Laboratory to design an entirely new kind of photoresist, one that combines the best features of two existing types of resist.
Firms buy specific keywords, including competitors’ brand names, on search engines such as Google or Bing to reach consumers searching for those words. Online advertisements employing such keywords are called search ads. This practice can backfire, however. A new study shows that any large difference in reputation between the two brand names is further magnified in the minds of consumers.
An Android update, wearable gadgets, and so-called smart home devices are just some of the innovations Google is likely to show off at its two-day developer conference, which begins today in San Francisco. In recent years, the conference has focused on smartphones and tablets, but this year Google's Android operating system is expected to stretch into cars, homes, and smartwatches.
New robot guides at a Tokyo museum look so eerily human and speak so smoothly they almost outdo people. The two life-size robots, which have silicon skin, artificial muscles, and can speak in a variety of voices, will be on display starting Wednesday, allowing the public to interact with them extensively.
At the 2014 Symposium on VLSI Technology in Triangle Park, N.C., researchers from the Univ. of California, Santa Barbara introduced the highest-performing class III-V metal-oxide semiconductor field-effect transistors (MOSFETs) yet demonstrated. The new MOSFETs exhibit, in an industry first, on-current, off-current and operating voltage comparable to or exceeding production silicon devices, while also staying relatively compact.
A cooing, gesturing humanoid on wheels that can decipher emotions has been unveiled in Japan by billionaire Masayoshi Son, who says robots should be tender and make people smile. The machine, called “Pepper”, has no legs, but has gently gesticulating hands. It recently appeared on a stage in a Tokyo suburb along with announcement that it will go on sale in Japan next year for the equivalent of US$1,900.
The need for robust password security has never been more critical than now, as people use smartphones or tablets to pay bills and store personal information. A new Rutgers study shows that free-form gestures can be used to unlock phones and grant access to apps. These gestures are less likely to be observed and reproduced than than traditional methods such as typed passwords.
Highlighting the impact of malicious software, Target suffered the largest retail hack in U.S. history during the Christmas shopping season of 2013. To help combat this worsening trend, Virginia Tech computer scientists have used causal relations to determine whether or not network activities have justifiable and legitimate causes to occur. The work effectively isolates infected computer hosts and detects in advance stealthy malware.
- Page 1