Noticias y opinión
ZeroTouch can turn a traditional computer monitor into a multi-touch screen
The cloud computing research team at the National Institute of Standards and Technology (NIST) is requesting public comments on a draft of its most complete guide to cloud computing to date.
Steven Levy's new book on Google sticks close to the legend, but offers some fascinating inside detail.
MIT and Northeastern University researchers devised a computer algorithm that can generate a controllability structure for any complex network. The red points are 'driver nodes,' which can control the rest of the nodes (green). Image: Mauro Martino
For years, the relationship between Internet service provider and home user has been a simple, all-you-can-eat model: Pay a flat monthly fee and enjoy all the broadband you want, every byte of which streams at those fantastic speeds the ISPs advertise. Right?
A team from the Virginia Tech Information Technology Security Laboratory and Bradley Department of Electrical and Computer Engineering won third place in the 2011 National Security Innovation Competition sponsored by the National Homeland Defense Foundation, a nonprofit forum for responding to terrorism tactics and natural disasters.
Researchers have defined a new class of software, calling it "surrogate interaction," which enables designers and video gamers to more easily change features of complex objects like automotive drawings or animated characters.
Computer models used to forecast storms don't (yet) know how to take advantage of the additional capabilities that will soon be available from advanced dual-polarimetric radar units being installed around the country by the National Weather Service.
Canonical switches from Eucalyptus to OpenStack for its preferred cloud stack for Ubuntu Server
Precise Biometrics' embedded sofware makes it easier for any hardware company to quickly integrate fingerprint verification