Noticias y opinión
At RSA Conference, researchers demonstrate tools that let hackers track smartphone users
Hype, misuse, and misplaced aspirations have clouded the term's definition. Here's what it's really about
Computer engineers in the US writing in the International Journal of Communication Networks and Distributed Systems have reviewed the research literature to get a clear picture of cloud computing, its adoption, use and the security issues it faces.
Emotion-sensing computer software that models and responds to students cognitive and emotional states including frustration and boredom has been developed by University of Notre Dame Assistant Professor of Psychology Sidney DMello and a colleague from Massachusetts Institute of Technology. DMello also is a concurrent assistant professor of computer science and engineering.
Today a consortium of leading IT providers and three of Europes biggest research centres (CERN, EMBL and ESA) announced a partnership to launch a European cloud computing platform. "Helix Nebula - the Science Cloud" , will support the massive IT requirements of European scientists, and become available to governmental organisations and industry after an initial pilot phase.
First, the bad news: all across America, trucks and tractor-trailers are transporting industrial explosives on nearly every artery of the country's interstate and highway system. That's right, volatile explosives, including munitions, rocket motors, and dynamite, are moving at a high rate of speed down a roadway not too far from you.
Predicting how large numbers of visitors to major events will behave is difficult. To prevent disasters, however, the police, rescue services and event organizers have to be able to identify dangerous bottlenecks, hidden obstacles and unexpected escape routes in advance. A research group with scientists from Technische Universitaet Muenchen (Germany) has developed a simulator that can be used to compute different scenarios. The program can simulate the behavior of tens of thousands of people.
Smartphone owners can surf the Web, pay bills, watch videos, enjoy music and send email. But while their gadgets have been designed to handle increasing amounts of data, experts say, less attention has been paid to their ability to clearly convey the sound of someone's voice, especially in noisy restaurants and other places.
(PhysOrg.com) -- If Google loyalists will persist that this Internet Goliath can do no evil, they at least need to admit, based on new evidence this week, that Google can do a lot of mindless harm. A security door in Android smartphones is left open that can enable Android apps to nab your photos without your permission. In fact this has been an unsettling week in smartphone revelations. People have been informed that whether their smartphone of choice is from Apple with iOS or another vendors phone with Android, they can never be certain who out there in cyberspace ...
El volumen de tráfico de datos en dispositivos móviles se incrementará hasta 18 veces en los próximos cinco años. Así lo publica Cisco en un estudio que revela que el incremento de la velocidad de circulación o el incremento en la potencia de los móviles serán los elementos clave de esta revolución en el uso de Internet a través de estos aparatos. Por María Llebrez.