Noticias y opinión
Natural security introduces a new payment authentication solution based on secure element and biometric recognition
(PhysOrg.com) -- Software developed at Oxford University that accurately assesses what people mean from what they say online will provide a valuable sentiment analysis tool for businesses, particularly finance companies.
(PhysOrg.com) -- Researchers using the OLCF's resources can foresee substantial changes in their scientific application code development in the near future.
The latest addition to computing power at DOEs Fermi National Accelerator Laboratory is a 45-teraflop cluster of graphics processing units that scientists use to explore the properties of the strong nuclear force. The GPU nodes power through data faster than any other computing nodes at more than five times the rate of the processing units of the previous generation.
A paper written by Dr. Paul Gratz and his graduate student, Reena Panda, from the Department of Electrical and Computer Engineering at Texas A&M University was selected as one of the best papers from IEEE Computer Architecture Letters in 2011 and will be featured during a special session during The 18th IEEE International Symposium on High-Performance Computer Architecture (HPCA).
Emotions are an important factor that must be taken into account when designing any type of software. This is the conclusion reached through a research project coordinated by the Universidad Carlos III de Madrid (Spain) that analyzes the role played by feelings in the users and developers of computer systems.
Error-correcting codes are one of the triumphs of the digital age. Theyre a way of encoding information so that it can be transmitted across a communication channel such as an optical fiber or a wireless connection with perfect fidelity, even in the presence of the corrupting influences known as noise.
Satellite telephony was thought to be secure against eavesdropping. German researchers at the Horst Gortz Institute for IT-Security (HGI) at the Ruhr University Bochum (RUB) have cracked the encryption algorithms of the European Telecommunications Standards Institute (ETSI), which is used globally for satellite telephones, and revealed significant weaknesses. In less than an hour, and with simple equipment, they found the crypto key which is needed to intercept telephone conversations. Using open-source software and building on their previous research results, they were able to exploit the security weaknesses.
(PhysOrg.com) -- New and better ways of measuring high-tech energy consumption could lead to significant environmental and economic gains, a study from The Australian National University has found.
Researchers from North Carolina State University have developed a new technique that allows graphics processing units (GPUs) and central processing units (CPUs) on a single chip to collaborate boosting processor performance by an average of more than 20 percent.