Information technology
Data mining without prejudice
By By Larry Hardesty, MIT News Office | 17 Dec 2011
Most previous attempts to create general data-mining algorithms have tended to privilege some relationships over others. A new technique for finding relationships between variables in large datasets makes no prior assumptions about what those relationships might be
Hardware adapts to the software used
08 Dec 2011
Important step toward computing with light
By By David L. Chandler, MIT News Office | 23 Nov 2011
Mimicking the brain, in silicon
By By Anne Trafton, MIT News Office | 15 Nov 2011
For decades, scientists have dreamt of building computer systems that could replicate the human brain’s talent for learning new tasks. Now new computer chip models how neurons communicate with each other at synapses
New hybrid technology could bring 'quantum information systems'
29 Oct 2011
The technology hinges on using single photons — the tiny particles that make up light — for switching and routing in future computers that might harness the exotic principles of quantum mechanics
Stanford software that models human motion travels to museum
By By Andrew Myers | 29 Oct 2011
Virtual reality helps treat social anxiety
24 Oct 2011
Progress in quantum computing, qubit by qubit
15 Oct 2011
New knowledge about "flawed" diamonds could speed the development of diamond-based quantum computers
12 Oct 2011
Graphene’s ‘Big Mac’ creates next generation of chips
10 Oct 2011
Scientists at the University of Manchester have come one step closer to creating the next generation of computer chips using wonder material graphene
Mini-quantum computer passes test
23 Sep 2011
Quantum computing with light
By By Larry Hardesty, MIT News Office | 12 Sep 2011
Better 'photon loops' may be key to computer and physics advances
23 Aug 2011
Scientists find a way to alter the path of photons allowing them to travel around physical defects. This work may lead to faster processors on desktops
Etch-a-sketch with superconductors
23 Aug 2011
Simple security for wireless
22 Aug 2011
Researchers demonstrate the first wireless security scheme that can protect against “man-in-the-middle” attacks — but doesn’t require a password.
Latest articles
Featured articles
Artemis II and the economic outlook for lunar infrastructure
By Axel Miller | 01 Apr 2026
Artemis II will test deep-space systems and support future lunar missions, shaping the next phase of the global space economy.
Synthetic diplomacy: The $50 billion mirage and the new era of market-moving deepfakes
By Cygnus | 30 Mar 2026
Synthetic diplomacy shows how deepfakes could trigger market volatility, highlighting the growing need for verification in global financial systems.
AI war shifts gears: chips, drones reshape global power
By Cygnus | 27 Mar 2026
AI competition is shifting as chips, drones and supply chains reshape global power, impacting tech, defense and business strategies.
Trump’s Iran strike delay lifts markets, but risks remain elevated
By Axel Miller | 24 Mar 2026
Trump’s Iran strike delay eased market fears, sending oil lower and lifting Sensex. Risks remain as geopolitical tensions continue.
The rise of the ‘ghost executive’: how autonomous AI agents are entering the C-suite
By Cygnus | 17 Mar 2026
Autonomous AI agents are influencing business decisions and reshaping leadership structures as companies adopt agentic AI systems in 2026.
The sky is closing: The end of the global crossroads
By Axel Miller | 16 Mar 2026
Middle East airspace disruptions are forcing airlines to reroute global flights, raising costs and reshaping aviation networks in 2026.
Living in the “New Gulf”: how conflict is reshaping cities and infrastructure
By Cygnus | 16 Mar 2026
Gulf states are redesigning infrastructure, air defenses and aviation networks as regional tensions reshape urban resilience strategies.
The Petro-Tech Pivot: Why Your Next Phone Is Built on Shifting Sands
By Cygnus | 12 Mar 2026
Rising crude prices are reshaping electronics manufacturing as petrochemical costs drive pressure across the global tech supply chain.
Hardened compute: The rise of the data bunker
By Axel Miller | 11 Mar 2026
Explore how AI demand and geopolitical risk are driving investment in fortified data centers worldwide.


