Universities to help Watson tackle cybercrime
IBM is recruiting eight US universities to help train Watson for Cyber Security, a new cloud-based version of its cognitive technology.
IBM is recruiting eight US universities to help train Watson for Cyber Security, a new cloud-based version of its cognitive technology.
Government agencies responsible for deploying the technology that will drive the National Disability Insurance Scheme (NDIS) will soon gain access to the cognitive computing capabilities of IBM’s Watson.
Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing and where those websites are hosted.
U.S. President Barack Obama should oppose legislation intended to let businesses share cyberthreat information with each other and with government agencies because the bill would allow the sharing of too much personal information, a coalition of digital rights groups and security experts said.
Like visiting a junk yard to find cheap parts for an aging vehicle, researchers from the Massachusetts Institute of Technology have come up with a way to fix buggy software by inserting working code from another program.
Many Android applications collect information on Wi-Fi access points, which researchers contend can be used to figure out where a person is more than 90 percent of the time.
You've got the perfect shot of a cityscape from your hotel room -- if it weren't for those pesky reflections in the window.
Researchers at the Massachusetts Institute of Technology have developed a tiny wireless trackpad that can be worn on a thumbnail.
Now that machine-learning algorithms are moving into mainstream computing, the Massachusetts Institute of Technology is preparing a way to make it easier to use the technique in everyday programming.
As more sensors get added to the Internet of Things, power consumption can pose a problem, but researchers at the Massachusetts Institute of Technology have come up with a way to reduce the energy that such components require.
As each new generation of computer processors arrives with a larger number of computing cores, computer scientists grapple with how best to make use of this proliferation of parallel power.
Just three small clues -- receipts for a pizza, a coffee and a pair of jeans -- are enough information to identify a person's credit card transactions from among those of a million people, according to a new study.
A new algorithm could let robots more precisely identify and handle objects around them, making them more useful at completing household tasks.
The White House has declined to act on two petitions, collectively signed by 90,000 people, that called for the president to fire the federal prosecutors who charged the late Internet activist Aaron Swartz with computer hacking.
Building a moderately complex Web page requires understanding a whole stack of technologies, from HTML to JavaScript. Now a researcher from the Massachusetts Institute of Technology (MIT) has wrapped these technologies into a single language that could streamline development, speed up performance and better secure Web sites.