Computer Archive

Your doctor’s computer may have suggested opioids because drugmakers paid to tweak the software, DOJ says

San Francisco-based medical records startup Practice Fusion allegedly developed software for pharmaceutical companies to help increase the number of prescriptions doctors wrote for pain medications, according to a settlement with the US Department of Justice, Bloomberg reports. The company, which supplied its software to tens of thousands of doctors

1-800-Surveillance State: Agencies Can Snoop On Any Computer, Says Centre

Investigating agencies will have more sweeping powers to intercept and monitor information on computer devices after a new home ministry order signed by Home Secretary Rajiv Gauba on Thursday. Ten central agencies have been equipped with powers of “interception, monitoring and decryption of any information generated, transmitted,

Computer programming made easier

Nobody said computer programming was easy. But maybe in the future, it could be. In order to simplify program development, a National Science Foundation (NSF)-supported project called Expeditions in Computer Augmented Program Engineering (ExCAPE), is developing technology that provides human operators with automated assistance. “Computers have revolutionized

New computer program can help uncover hidden genomic alterations that drive cancers

To better characterize the functional context of genomic variations in cancer, researchers developed a new computer algorithm called REVEALER. Credit: UC San Diego Health Cancer is rarely the result of a single mutation in a single gene. Rather, tumors arise from the complex interplay between any number

Computer security: With Boxmate malicious programs have no place left to hide

By preventing unexpected behavior changes, the “Boxmate” approach defends existing embedded systems, mobile devices, and even servers against known and as-yet unknown forms of attack. Computer scientists from the Center for IT Security, Privacy and Accountability (CISPA) at Saarland University will present their method for the first