Monday, 26 de September de 2016

Noticias y opinión


'Fabric' would tighten the weave of online security

(PhysOrg.com) -- As we become increasingly dependent on computers to manage our lives and businesses, our money and privacy become less and less secure. But now, Cornell researchers offer a way to build security into computer systems from the start, by incorporating security in the language used to write the programs.

(hace 5 years, 11 months) | Seguir leyendo

Una web relaciona la información geográfica de España con la estadística

Desarrollada en la FIUPM, reúne en un mismo mapa la situación de las playas y el índice de paro en la zona

(hace 5 years, 11 months) | Seguir leyendo

Japón estrena el primer cartel de vía pública que reconoce consumidores

Después de probar suerte con máquinas expendedoras que proponían productos según la edad, se instaló un sistema gigante que opera al ver las caras

(hace 5 years, 12 months) | Seguir leyendo

The Hot New Thing in Biometric Security is... Ears

Ears don't change shape, grow hair or wear disguises. They are the perfect means of identification.

(hace 5 years, 12 months) | Seguir leyendo

Gartner: How to reduce your software costs

(hace 5 years, 12 months) | Seguir leyendo

Scoring Points with Everyday Browsing

New Web services offer rewards for your Internet habits in hopes of encouraging you to spend more time on certain sites.

(hace 5 years, 12 months) | Seguir leyendo

RF Technologies announces Smart Sense for infant security

(hace 5 years, 12 months) | Seguir leyendo

Truthy.indiana.edu to search, identify smear tactics, Twitter-bombs through election runup

Streaming Twitter data acquired in real-time is matched against keywords to exclude tweets unlikely to contain political discussion and extract memes (mentions, hash tags, and urls). Memes of interest are isolated by considering only those that have just undergone significant changes in volume, or those that account for a significant portion of the total volume. Memes are then inserted in a database and Twitter API is used to obtain more information on each. Credit: Indiana University Center for Complex Networks and Systems Research

(hace 5 years, 12 months) | Seguir leyendo

Print Ads and QR Codes Combined with Mobile Scanning Software

(hace 5 years, 12 months) | Seguir leyendo

First improvement of fundamental algorithm in 10 years

The max-flow problem, which is ubiquitous in network analysis, scheduling, and logistics, can now be solved more efficiently than ever.

(hace 6 years) | Seguir leyendo

Google Researching Real-Time Frustration Detection

Having seen how users react when their searches fail, Google researchers foresee a time when computers can determine when users are banging their heads against walls.

(hace 6 years) | Seguir leyendo

Detecting Danger in the Cloud

HyperSentry software improves ability to detect malware in cloud-computing systems

(hace 6 years) | Seguir leyendo

InterSystems Updates Object Database; Focuses On Event Processing in Java

Database Mirroring feature provides automatic failover between any two CACHE-based systems

(hace 6 years) | Seguir leyendo

Private Cloud Computing Deployment at a National Lab

(hace 6 years) | Seguir leyendo

Orange partners with Cisco, EMC, VMware for cloud service

Orange Business Services to become a cloud service provider

(hace 6 years) | Seguir leyendo

The necessity of green IT

Power costs are no laughing matter

(hace 6 years) | Seguir leyendo

RFID-enabled energy monitoring solution for data centers

(hace 6 years) | Seguir leyendo

Gartner: 1 in 4 server workloads will be virtual by year-end

(hace 6 years) | Seguir leyendo

MeeGo Gets Ported to Additional Smartphones

Nexus One, HTC Desire, and Dell Streak all get the open source OS.

(hace 6 years) | Seguir leyendo

IBM to Acquire BLADE Network Technologies

(hace 6 years) | Seguir leyendo