Noticias y opinión
Free online tool regroups several important tests, educates users, and makes recommendations for each aspect of email security
Windows Azure, Internet Explorer 9, and Windows Phone 7 discussed
Researchers To Demonstrate New Attack That Exploits HTTP
With a lifelong interest in politics, University of Cincinnati researcher Muer Yang spent the last two years developing a quantitative method for allocating voting machines that could significantly reduce the average wait time of voters.
One of the serious threats to a user's computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone's identity. This form of an attack is increasing, infecting enterprise and personal computers, and caused by "organized malicious botnets," said Daphne Yao, assistant professor of computer science at Virginia Tech.
Although he trained as a medical doctor, Dr. Ion Morarus only patients now are computers, tasked to perform a host of incredibly sophisticated computing chores for a growing number of laboratories and departments at the Health Center and worldwide.
Visual Studio Async aims to make asynchronous programming more approachable so code is as easy to write and maintain as with synchronous code
The company detailed its public and private cloud offerings at the Cloud Computing Conference & Expo conference
Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofing Technique
A new search engine, Blekko, uses human editors to promote quality pages and block spam content from its results.
La UIT armoniza las tecnologías móviles de la próxima generación (4G)
Small sensors could form backbone of next generation network
Apple, Google, IBM, Intel " the IT market is buzzing. Only AMD still has to step up a gear. But also IBM has taken a loss, Fellow Emeritus Benoà®t Mandelbrot.
New search technologies can identify influential documents without relying on links.
Extended support for Windows 7 with enhanced multimedia & security