Noticias y opinión
Developers still see it as the future, but they think it is currently overhyped and vendor-driven
Unhappy customers often tweet their gripes now AT&T is mining those complaints to improve its service.
The last decade expanded what we could do online, but the Web's basic programming couldn't keep up. That threatened to fracture the world's greatest innovation engine—until a small group of Web rivals joined forces to save it.
New software watches users to figure out what products they might buy.
Data mining techniques reveals fake Twitter accounts that give the impression of a vast political movement.
Free online tool regroups several important tests, educates users, and makes recommendations for each aspect of email security
Windows Azure, Internet Explorer 9, and Windows Phone 7 discussed
Researchers To Demonstrate New Attack That Exploits HTTP
With a lifelong interest in politics, University of Cincinnati researcher Muer Yang spent the last two years developing a quantitative method for allocating voting machines that could significantly reduce the average wait time of voters.
One of the serious threats to a user's computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone's identity. This form of an attack is increasing, infecting enterprise and personal computers, and caused by "organized malicious botnets," said Daphne Yao, assistant professor of computer science at Virginia Tech.
Although he trained as a medical doctor, Dr. Ion Morarus only patients now are computers, tasked to perform a host of incredibly sophisticated computing chores for a growing number of laboratories and departments at the Health Center and worldwide.
Visual Studio Async aims to make asynchronous programming more approachable so code is as easy to write and maintain as with synchronous code
The company detailed its public and private cloud offerings at the Cloud Computing Conference & Expo conference
Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofing Technique