Don’t worry about disobedient machines. Devious human masters and misunderstood commands are the real threat
Hollywood’s dark vision of machines taking over belies how far AI is from meaningful reality—and what it will look like when it gets there
Alex Bocharov explains why the company is hoping to build qubits out of particles that some scientists think might not even exist
Online attacks are unpredictable and hard to control, leading to worries that White House cyber rattling could quickly escalate
DeepMind’s latest technique uses external memory to solve tasks that require logic and reasoning—a step toward more humanlike AI
From robotic arms to brain–computer interfaces, the unique event featured some of today’s most cutting-edge assistive devices
Quantum scientist Michele Mosca will discuss security in the coming quantum age during a live Webcast tonight at 7 P.M.
Artificial intelligence is everywhere. But before scientists trust it, they first need to understand how machines learn
The Nobel Prize in Physics was awarded today to David J. Thouless, F. Duncan Haldane and J. Michael Kosterlitz for theoretical discoveries of topological phase transitions and topological phases of matter.
David J. Thouless, F. Duncan Haldane and J. Michael Kosterlitz split the 2016 Nobel Prize in Physics for theoretical discoveries of topological phase transitions and topological phases of matter.
The Internet giant claims its latest service employs neural networks to cut the error rate by 60 percent
The Internet of Things, streaming virtual reality and many other much-hyped technologies cannot exist without a complete rethinking of how mobile devices get online
Researchers used high-tech visualization techniques to peer inside an ancient scroll too fragile to unwrap.
The chip uses pulses of laser light to generate truly random numbers, the basis of encryption. Christopher Intagliata reports.
To preserve your data, you’ll have to migrate them to a new digital format every decade or so
But they may soon. Researchers have written a program that detects smart-asses on social media and the Web
An artificial intelligence system is drastically expanding its reach in Asia
Researchers found that a bad actor could cheaply and easily clone a remote keyless entry system to gain entry. Christopher Intagliata reports.
Researchers are scrambling to repair and expand data pipes worldwide—and to keep the information revolution from grinding to a halt
A new imaging technique could help make imaginary characters appear to convincingly interact with a gamer's actual surroundings