Refine Search

  •  
  •  
P@$$w0rd confusion has many people seeking other options

...write them."We are in the midst of an era I call the 'tyranny of the password,'" says Thomas Way, a computer science professor at Villanova University."We're due for a revolution."One could argue that the revolution is already...

http://chronicle.augusta.com/news/business/2014-07-10/pw0rd-confusion-has-many-p
Backlash stirs in US against foreign worker visas

...workers don't constantly retrain themselves, their skills become obsolete," he said.Norm Matloff, a computer science professor at the University of California, Davis, agreed that age plays into it - not because older workers are less...

http://chronicle.augusta.com/news/business/2014-07-06/backlash-stirs-us-against-
Can hackers take over your car?

...through its cellular, Bluetooth and other wireless connections - even the CD player. Stefan Savage, a UCSD computer science professor, said he and other researchers could control nearly everything but the car's steering. "We could have turned...

http://chronicle.augusta.com/news/metro/2013-09-04/can-hackers-take-over-your-ca
As auto technology builds, so does hacking

...or a spy could listen to conversations inside a car, Stefan Savage, a University of California-San Diego computer science professor, said in a telephone interview. He co-wrote a paper last year after discovering ways to hack into cars...

http://chronicle.augusta.com/life/autos/2012-02-09/auto-technology-builds-so-doe
Business news

...found that Apple infringed on three patents held by Mirror Worlds LLC, a company founded by Yale University computer science professor David Gelernter to commercialize his ideas.

http://chronicle.augusta.com/news/business/2010-10-05/business-news
Business
Driverless military truck lurches from lab to streets

...just trying to win, but we're also trying to advance the topic of safer cars," said Sebastian Thrun, a computer-science professor who leads Stanford University's team. "There are so many other great uses of this technology." Mr. Thrun...

http://chronicle.augusta.com/stories/2007/10/07/bus_146511.shtml
Business
Electronic voting faces new scrutiny

...with them. The copies would be rolled into canisters and stored for nearly two years. A Princeton University computer science professor reported this month that he and a pair of graduate students were able to hack into a Diebold electronic voting...

http://chronicle.augusta.com/stories/2006/09/24/met_97965.shtml
Metro
Hackers gather at confab to penetrate computers, pick locks, spray pellets

...liabilities. "The ability to do something that's socially unacceptable is always a thrill," says Chris Eagle, a computer science professor at the Naval Postgraduate School in Monterey, Calif. Several rooms away, 17-year-old Dan Beard is readying...

http://chronicle.augusta.com/stories/2006/08/07/liv_91676.shtml
Life & style
Health, safety applications created for phones

...They can range from informative to fun -- part of what gives them market potential, said Robert Jarman, a computer science professor at Augusta State University."It's something that is going to do nothing but grow as the networks and technologies...

http://chronicle.augusta.com/news/metro/2010-04-28/health-safety-applications-cr
Metro | Augusta State University | Medical College of Georgia
Sony's software removal scheme aggravates security hole

...This is a surprisingly bad design from a security standpoint," said Ed Felten, a Princeton University computer science professor who explored the removal program with a graduate student, J. Alex Halderman. "It endangers users in several...

http://chronicle.augusta.com/stories/2005/11/16/bus_23255.shtml
Business