IT

Cognitive computing means giving computers the ability to work out complex problems for themselves. Just like humans, cognitive computers benefit greatly from experience, learning better ways to solve problems with each encounter. When a traditional system of rules finds a task impossible, cognitive computing sees...

How do humans interpret and understand art? The nature of artistic style, seemingly abstract and intuitive, is the subject of ongoing debate within art history and the philosophy of art. When we talk about paintings, artistic style can refer to image features like the brushstrokes, contour...

Apple, Amazon, Facebook, Google, Microsoft… and now, Yahoo.The onetime leader of all things Internet is just the latest large tech company to enter the bot and messaging fray. Today, Yahoo unveiled three bots for the Kik platform: @yahoonews; @yahooweather; and @MonkeyPets, a virtual emoji-loving companion....

Vice President Joe Biden unveiled the precision medicine database on Monday, speaking at its operations center at the University of Chicago. The project, named Genomic Data Commons, is a National Cancer Institute initiative and is central to the National Cancer Moonshot and Precision Medicine Initiative. Funding...

Cybersecurity special report: Ransomware will get worse, hackers targeting whales, medical devices and IoT trigger new vulnerabilities. Cybercriminals have set their sights on healthcare. Ransomware is the new normal. And many providers are approaching security all wrong. CIOs, CISOs, ethical hackers and other experts point...

It’s easier than ever to make a mobile game. Unfortunately, it’s also easier than ever for a mobile game to fail. But developers and publishers can maximize their chances by following a handful of important rules. More than 1.8 billion people are playing mobile games around...

Watson, IBM's computer brain, has a lot of talents. It mastered "Jeopardy!," it cooks, and even tries to cure cancer. But now, it’s training for a new challenge: Hunting hackers....

The surge of information leaks from highly confidential sources in recent years demonstrates the futility of current cyber defenses. The leaks of U.S. diplomatic cables, Office of Personnel Management data, CIA operational documents and most recently client files from the Panamanian law firm of Mossack Fonseca...