Wednesday, 29 de July de 2015

Noticias y opinión


Cyberinfrastructure for Geography Software

CyberGIS project launched for high-performance, collaborative geospatial problem solving

(hace 4 years, 8 months) | Seguir leyendo

Software for Brain Mapping

Researchers develop tool for three-dimensional maps of brain wiring

(hace 4 years, 8 months) | Seguir leyendo

Android: el asalto al iPhone

(hace 4 years, 8 months) | Seguir leyendo

Cloud computing underwhelms PHP developers

Developers still see it as the future, but they think it is currently overhyped and vendor-driven

(hace 4 years, 8 months) | Seguir leyendo

Using Twitter to Track Dropped Calls

Unhappy customers often tweet their gripes now AT&T is mining those complaints to improve its service.

(hace 4 years, 8 months) | Seguir leyendo

SOA, semantics, services combine in DoD effort

(hace 4 years, 8 months) | Seguir leyendo

Improving Health Care in the Internet Age

(hace 4 years, 8 months) | Seguir leyendo

The Web Is Reborn

The last decade expanded what we could do online, but the Web's basic programming couldn't keep up. That threatened to fracture the world's greatest innovation engine—until a small group of Web rivals joined forces to save it.

(hace 4 years, 8 months) | Seguir leyendo

Software Helps Websites Predict Users' Tastes

New software watches users to figure out what products they might buy.

(hace 4 years, 8 months) | Seguir leyendo

Bogus Grass-roots Politics on Twitter

Data mining techniques reveals fake Twitter accounts that give the impression of a vast political movement.

(hace 4 years, 8 months) | Seguir leyendo

Email Security Grader Evaluates Mail infrastructure Weaknesses

Free online tool regroups several important tests, educates users, and makes recommendations for each aspect of email security

(hace 4 years, 8 months) | Seguir leyendo

Microsoft Professional Developers Conference Roundup

Windows Azure, Internet Explorer 9, and Windows Phone 7 discussed

(hace 4 years, 8 months) | Seguir leyendo

Researchers To Demonstrate New Attack That Exploits HTTP

Researchers To Demonstrate New Attack That Exploits HTTP

(hace 4 years, 8 months) | Seguir leyendo

Voting-machine-allocation method could reduce voters' wait time by 36 percent

With a lifelong interest in politics, University of Cincinnati researcher Muer Yang spent the last two years developing a quantitative method for allocating voting machines that could significantly reduce the average wait time of voters.

(hace 4 years, 8 months) | Seguir leyendo

Virginia Tech computer scientist, student design award winning software to combat hacking

One of the serious threats to a user's computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone's identity. This form of an attack is increasing, infecting enterprise and personal computers, and caused by "organized malicious botnets," said Daphne Yao, assistant professor of computer science at Virginia Tech.

(hace 4 years, 8 months) | Seguir leyendo

Delivering the virtual cell to the world

Although he trained as a medical doctor, Dr. Ion Moraru’s only patients now are computers, tasked to perform a host of incredibly sophisticated computing chores for a growing number of laboratories and departments at the Health Center and worldwide.

(hace 4 years, 8 months) | Seguir leyendo

Internet Explorer 9 closes the HTML5 gap

IE9 Platform Preview 6 gains on Google Chrome and Firefox with big improvements in HTML5 compatibility and JavaScript performance

(hace 4 years, 8 months) | Seguir leyendo

Microsoft hails async programming for Visual Basic, C#

Visual Studio Async aims to make asynchronous programming more approachable so code is as easy to write and maintain as with synchronous code

(hace 4 years, 8 months) | Seguir leyendo

Oracle lays out its cloud vision

The company detailed its public and private cloud offerings at the Cloud Computing Conference & Expo conference

(hace 4 years, 8 months) | Seguir leyendo

Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofing Technique

(hace 4 years, 8 months) | Seguir leyendo