Information technology
Smart way of saving lives in natural disasters
04 Jan 2012
Data mining without prejudice
By By Larry Hardesty, MIT News Office | 17 Dec 2011
Most previous attempts to create general data-mining algorithms have tended to privilege some relationships over others. A new technique for finding relationships between variables in large datasets makes no prior assumptions about what those relationships might be
Hardware adapts to the software used
08 Dec 2011
Important step toward computing with light
By By David L. Chandler, MIT News Office | 23 Nov 2011
Mimicking the brain, in silicon
By By Anne Trafton, MIT News Office | 15 Nov 2011
For decades, scientists have dreamt of building computer systems that could replicate the human brain’s talent for learning new tasks. Now new computer chip models how neurons communicate with each other at synapses
New hybrid technology could bring 'quantum information systems'
29 Oct 2011
The technology hinges on using single photons — the tiny particles that make up light — for switching and routing in future computers that might harness the exotic principles of quantum mechanics
Stanford software that models human motion travels to museum
By By Andrew Myers | 29 Oct 2011
Virtual reality helps treat social anxiety
24 Oct 2011
Progress in quantum computing, qubit by qubit
15 Oct 2011
Graphene’s ‘Big Mac’ creates next generation of chips
10 Oct 2011
Scientists at the University of Manchester have come one step closer to creating the next generation of computer chips using wonder material graphene
Mini-quantum computer passes test
23 Sep 2011
Quantum computing with light
By By Larry Hardesty, MIT News Office | 12 Sep 2011
Better 'photon loops' may be key to computer and physics advances
23 Aug 2011
Scientists find a way to alter the path of photons allowing them to travel around physical defects. This work may lead to faster processors on desktops
Etch-a-sketch with superconductors
23 Aug 2011
Simple security for wireless
22 Aug 2011
Researchers demonstrate the first wireless security scheme that can protect against “man-in-the-middle” attacks — but doesn’t require a password.