Machines can't replicate human image recognition, yet
While computers can replicate many aspects of human behavior, they do not possess our ability to recognize distorted images, according to a team of Penn State researchers.
Twitter and health care -- can a tweet a day keep the doctor away?
Twitter, the increasingly popular social networking tool that was at first merely a convenient way to stay in touch with friends and family, is emerging as a potentially valuable means of real-time, on-the-go communication ...
Cyber-criminals targeting social networks: experts
Facebook, MySpace and other social networking sites are inceasingly being targeted by cyber-criminals drawn to the wealth of personal information supplied by users, experts warn.
Quantum memory and turbulence in ultra-cold atoms
Scientists at MIT have figured out a key step toward the design of quantum information networks. The results are reported in the July 20th issue of Physical Review Letters and highlighted in APS's on-line journa ...
Risks of sharing personal genetic information online need more study, bioethicists say
With just $399 and a bit of saliva in a cup, consumers can learn about their genetic risk for diseases from breast cancer to diabetes. Now, thanks to social networking sites set up by personal genomics companies, they can ...
Expert: Obama's cybersecurity response disappointing in scope
President Barack Obama's announcement today (May 29) that he will create a cybersecurity coordinator in the White House with responsibility for information security is a step in the right direction, but more has ...
Scientists demonstrate all-fiber quantum logic
A team of physicists and engineers have demonstrated all-fibre quantum logic, where single photons are generated and used to perform the controlled-NOT quantum logic gate in optical fibres with high fidelity.
Online surveillance tools provide opportunity to support public health
Tapping the Internet - including personal Web searches, news reports, blogs, chat rooms and social networking sites - is fast becoming a way to get a complete, up-to-the-minute view of public health threats, say researchers ...
Sources: Pentagon planning new cybercommand
(AP) -- The Pentagon is planning to create a new military command to focus on cyberspace and protect its computer networks from cyberattacks, U.S. officials said Wednesday.
Pentagon spends $100 million to fix cyber attacks
(AP) -- The Pentagon spent more than $100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems, military leaders said Tuesday.
Food choices evolve through information overload
Ever been so overwhelmed by a huge restaurant menu that you end up choosing an old favourite instead of trying something new?
Breaches emphasize need for scanning, encryption
Recent news reports indicate a computer containing confidential information about the helicopter that transports President Barack Obama was breached by a computer in Iran. In January, Heartland Payment Systems, a company ...
High-tech solutions ease inaugural challenges
Transportation and security officials on Inauguration Day will have a centralized, consolidated stream of traffic information and other data displayed on a single screen using software developed by the University ...
P2P traffic control
Could a concept from information technology familiar to online file sharers be exploited to reduce road congestion and even traffic accidents? That is the question answered in the affirmative by researchers in California, ...