Noticias y opinión
(PhysOrg.com) -- As we become increasingly dependent on computers to manage our lives and businesses, our money and privacy become less and less secure. But now, Cornell researchers offer a way to build security into computer systems from the start, by incorporating security in the language used to write the programs.
Desarrollada en la FIUPM, reúne en un mismo mapa la situación de las playas y el índice de paro en la zona
Después de probar suerte con máquinas expendedoras que proponían productos según la edad, se instaló un sistema gigante que opera al ver las caras
Ears don't change shape, grow hair or wear disguises. They are the perfect means of identification.
New Web services offer rewards for your Internet habits in hopes of encouraging you to spend more time on certain sites.
Streaming Twitter data acquired in real-time is matched against keywords to exclude tweets unlikely to contain political discussion and extract memes (mentions, hash tags, and urls). Memes of interest are isolated by considering only those that have just undergone significant changes in volume, or those that account for a significant portion of the total volume. Memes are then inserted in a database and Twitter API is used to obtain more information on each. Credit: Indiana University Center for Complex Networks and Systems Research
The max-flow problem, which is ubiquitous in network analysis, scheduling, and logistics, can now be solved more efficiently than ever.
HyperSentry software improves ability to detect malware in cloud-computing systems
Database Mirroring feature provides automatic failover between any two CACHE-based systems
Orange Business Services to become a cloud service provider
Power costs are no laughing matter
Nexus One, HTC Desire, and Dell Streak all get the open source OS.