Noticias y opinión
Researchers See Real-Time Phishing Jump
Affordable video glasses can produce dazzling special effects, but who'll wear them?
El 7% de los usuarios conectados a la red ya lo usan y generarán 8.000 millones de euros en 2015
Aro goes through the clutter of texts, calls, and e-mails on a device to make sense out of a chaotic social network.
Microsoft unveils blueprints, training and 70 certified hosting providers for private Azure clouds
Berkeley students help produce information and infrastructure that could inform the design and development of a sustainable model
'BlackSheep' Sniffs Out Firesheep WiFi-Hacking
The Microsoft Kinect is fun, but it shows that so-called natural user interfaces still have a long way to go.
Imagine that one of the world's most powerful high performance computers could be packed into a single rack just 24 inches wide and powered by a fraction of the electricity consumed by comparable current machines. That would allow an unprecedented amount of computing power to be installed on aircraft, carried onto the battlefield for commanders – and made available to researchers everywhere.
Desde febrero, la amenaza más repetida en el ranking de malware que elabora la empresa de seguridad G Data afectaba a los PDF. Ahora Java ocupa esa primera posición.
FRANKFURT, Germany, November 08, 2010 "The remarkable success of the first international ISC Cloud'10 Conference has motivated the organizers " ISC Events - to organize a similar Cloud Computing conference with an even more profound focus on the usage of Clouds for High Performance Computing in 2011.