Rovi Corp.'s shares fell Monday after an initial decision in a patent dispute did not come down in the interactive TV listing company's favor. The Santa Clara, Calif., company argued that Netflix Inc. and Roku had infringed on four of Rovi's patents. But an administrative law judge for the United...
New technology under development at The Ohio State University is paving the way for low-cost electronic devices that work in direct contact with living tissue inside the body. The first planned use of the technology is a sensor that will detect the very early stages of organ transplant rejection.
Scientists at ORNL have advanced on the goal of two-dimensional electronics with a method to control the growth of uniform atomic layers of molybdenum disulfide (MDS). MDS, a semiconductor, is one of a trilogy of materials needed to make functioning 2-D electronic components.
For more than 50 years, linguists and computer scientists have tried to get computers to understand human language by programming semantics as software. Driven initially by efforts to translate Russian scientific texts during the Cold War (and more recently by the value of information retrieval and data analysis tools), these efforts have met with mixed success.
China's astronauts have braved the tension of docking with a space station and performed delicate tasks outside their orbiting capsule, but now face a more down-to-earth job that is perhaps equally challenging: Talking to young people about science.
Harried Venezuelans who devote hours scouring supermarkets for increasingly scarce food basics and toilet paper have just received some digital help thanks to a young software developer. A free application for mobile devices written by Jose Augusto Montiel lets people notify one another where flour, sugar, milk, cooking oil and toilet paper are for sale.
The supersecret agency with the power and legal authority to gather electronic communications worldwide to hunt U.S. adversaries says it has the technical know-how to ensure it's not illegally spying on Americans. But mistakes do happen in data-sifting conducted mostly by machines, not humans.
Eager to quell a domestic furor over U.S. spying, the nation's top intelligence official stressed Saturday that a previously undisclosed program for tapping into Internet usage is authorized by Congress, falls under strict supervision of a secret court and cannot intentionally target a U.S. citizen.
The United States and China are in "uncharted waters" as they tackle the contentious issue of cybersecurity, President Barack Obama said following the opening round of talks with Chinese President Xi Jinping at a summit in the California desert.
U.S. government snooping does not surprise global Internet users, who say they already have few expectations of online privacy as governments increasingly monitor people's digital lives and Internet companies often acquiesce. Concerned privacy activists called on people to better protect their digital data.
We knew that the technology was there. We knew that the law might allow it. As we stood under a security camera at a street corner, connected with friends online or talked on a smartphone equipped with GPS, we knew, too, it was conceivable that we might be monitored.
Neil Armstrong's name is attached to a lunar crater, an asteroid, more than a dozen schools and a museum, but not a single NASA facility is christened in honor of the man whose "giant leap" made him the first to walk on the moon. All that could soon change on the fringes of the Mojave Desert...
Google CEO Larry Page and Facebook chief executive Mark Zuckerberg are denying reports that depict two of the Internet's most influential companies as willing participants in a secret government program that gives the National Security Agency unfettered access to email and other personal information transmitted on various online services.
A day after the presidents of China and the United States ended their first summit, pledges of cooperation by the two leaders faced an early test from an unexpected quarter -- an American intelligence contractor was leaking highly sensitive U.S. surveillance programs from his hiding place in the Chinese territory of Hong Kong.
Homomorphic encryption is one of the most exciting new research topics in cryptography, which promises to make cloud computing perfectly secure. With it, a Web user would send encrypted data to a server in the cloud, which would process it without decrypting it and send back a still-encrypted result. Sometimes, however, the server needs to know something about the data it’s handling. Otherwise, some computational tasks become prohibit...