Hospital equipment vulnerable to hacking, IBM experimenting with electronic-blood technology to power and cool supercomputers, and police using crowdsourcing in investigations.