Google has become less likely to comply with government demands for its users' online communications and other activities as authorities in the U.S. and other countries become more aggressive about mining the Internet for personal data. Legal requests from governments for people’s data have risen 21% from the last half of last year.
A federal judge and lawyers for the world's two biggest smartphone makers began picking a jury Tuesday to determine how much Samsung Electronics owes Apple for copying vital iPhone and iPad features. A previous jury had awarded Apple $1.05 billion, but a judge found the jury miscalculated the amount and ordered a new trial to determine how much Samsung should pay.
Iris scans, fingerprint scans, facial and voice recognition are tools that improve security while making our lives easier, says Stephen Elliott, director of international biometric research at Purdue Univ. His basement lab is a place where emerging biometric technologies are tested for weaknesses before they can go mainstream.
Google says it is investing 450 million euros to expand a data center in southern Finland as part of Europe-wide development plans totaling hundreds of millions of euros. The investment comes on top of the 350 million euros Google Inc. has spent converting an old paper mill, which started operations as a data center in 2011.
The National Science Foundation, in partnership with the National Institutes of Health, U.S. Department of Agriculture and NASA, has announced new investments totaling approximately $38 million for the development and use of robots that cooperatively work with people to enhance individual human capabilities, performance and safety.
European Union lawmakers on Monday adopted sweeping new data protection rules to strengthen online privacy, and sought to outlaw most data transfers to other countries' authorities to prevent spying. The draft regulation was beefed up after Edward Snowden's leaks about allegedly widespread U.S. online snooping, and the legislation is poised to have significant implications for U.S. Internet companies.
Although the amount of data that can be stored has increased immensely during the past few decades, it is still difficult to actually store data for a long period of time. A researcher has recently demonstrated a way to store data for extremely long periods, even millions of years, using an etched wafer made of tungsten encapsulated by silicon nitride. The material is resistant to both time and elevated temperatures.
The San Diego Supercomputer Center at the Univ. of California, San Diego, has been awarded a grant from the National Science Foundation to build Comet, a new petascale supercomputer designed to transform advanced scientific computing by expanding access and capacity among research domains. Comet will be capable of an overall peak performance of nearly two petaflops, or two quadrillion operations per second.
Multiphysics software developer COMSOL is holding its COMSOL Conference Oct. 9-11 at the Boston Marriott Newton. The event will draw together more than 2,000 engineers, scientists and researchers to learn from leaders in multiphysics simulation and discover the latest tools from COMSOL.
Computing systems like IBM Research’s Watson have been engineered to learn, reason and help human experts make complex decisions involving extraordinary volumes of fast-moving data. To advance the development and deployment of these cognitive computing systems, IBM has announced a collaborative research initiative with four top universities.
With the rise of the iPhone, Android and other mobile devices has come a flood of applications designed to help people stay healthy. Food and Drug Administration officials say they will now begin regulating applications and gadgets that work with smartphones to take medical readings and help users monitor their health.
According to a recent study published by the National Science Foundation (NSF), businesses spent more on research and development (R&D) in 2011 than they did in 2010. The figures revealed that during 2011, companies in manufacturing industries performed $201 billion, or 68%, of domestic R&D.
Computers will someday soon automatically provide short video digests of a day in your life, your family vacation or an eight-hour police patrol, say computer scientists at the Univ. of Texas at Austin. The researchers are working to develop tools to help make sense of the vast quantities of video that are going to be produced by wearable camera technology such as Google Glass and Looxcie.
From Sept. 16 to 18, 2013, top leaders from the White House and U.S. science agencies and their international colleagues will gather for three days in Washington, D.C., for a major meeting of the Research Data Alliance (RDA). More than 850 researchers and data experts belong to the RDA, which focuses on the development and adoption of common tools, harmonized standards and infrastructure needed for data sharing by researchers.
During this week’s Intel Developer Forum, new Intel CEO Brian Krzanich announced a number of near-term changes for the company’s product line, including new LTE and 14-nm products, and a lower-power product family called Quark directed at future wearable electronics devices.
As cars become more like PCs on wheels, what's to stop a hacker from taking over yours? In recent demonstrations, hackers have shown they can slam a car's brakes at freeway speeds, jerk the steering wheel and even shut down the engine — all from their laptop computers. The hackers are...
Those separated from family and friends by long distances often use video conferencing services such as Skype in order to see each other when talking. But who hasn’t experienced the frustration of your counterpart not making direct eye contact during the conversation? A software prototype from the laboratories ETH Zurich may be able to help by leveraging the color and depth information made available by XBox Kinect cameras.
Vulnerabilities in software and firmware are the easiest ways to attack a system, and two revised publications from NIST approach the problem by providing new guidance for software patching and warding off malware. The new computer security guides to help computer system managers protect their systems.
Few are more excited about Lego's new Mindstorms sets rolling out next month than Silicon Valley engineers. Ostensibly geared toward children age 10 and over, the new Mindstorms will also appeal to professional hackers. The sets will use open source software, Linux, for the first time, and controller apps are integrated for tablets and mobile phones.
Kirobo—derived from the Japanese words for "hope" and "robot"—was among five tons of supplies and machinery on a rocket launched Sunday from Tanegashima in southwestern Japan. The childlike robot was designed to be a companion for astronaut Koichi Wakata and will communicate with another robot on Earth, according to developers.
In an effort to thwart forgeries, researchers in Switzerland have proposed a new miniaturized authentication system. By combining moiré patterns and microlithography techniques, authorities can be easily recognize counterfeits with the naked eye and counterfeiters will find it impossible to reproduce items through currently existing printer or scanner technology.
The Powerwall Theater (PWT) at Los Alamos National Laboratory is an innovative facility that enables researchers to view the complex models and simulations they have created using some of the world’s fastest supercomputers. Recently, PWT was upgraded with 40 double-stacked Christie Mirage 3-D LED projectors that will provide seamless, integrated 3-D visualization.
TCP, the transmission control protocol, is one of the core protocols governing the Internet: If counted as a computer program, it's the most widely used program in the world. One of its main roles is to prevent computer congestion. A new computer system, dubbed Remy, automatically generates TCP congestion-control algorithms that control network congestion at transmission rates two to three times as high as human-derived algorithms.
China's population of Internet users has grown to 591 million, driven by a 20% rise over the past year in the number of people who surf the Web from smartphones and other wireless devices, an industry group reported Wednesday. The rise of Web use has driven the growth of new Chinese industries from online shopping and microblogs to online video.
A Personal Identity Verification (PIV) card is a government-issued smart card used by federal employees and contractors to access government facilities and computer networks. To assist agencies seeking stronger security and greater operational flexibility, NIST has made several modifications to the previous version of Biometric Data Specification for PIV cards.