Advertisement
Computing
Subscribe to Computing
View Sample

FREE WDD Email Newsletter

Quantum Physics Secures New Cryptography Scheme

March 12, 2014 3:51 pm | by Centre for Quantum Technologies at the National University of Singapore | News | Comments

The way we secure digital transactions could soon change. An international team has demonstrated a form of quantum cryptography that can protect people doing business with others they may not know or trust – a situation encountered often on the internet and in everyday life, for example at a bank's ATM...

Government Surveillance — This is just the Beginning

March 12, 2014 2:51 pm | by TED Talk, Christopher Soghoian | Videos | Comments

Privacy researcher Christopher Soghoian sees the landscape of government surveillance shifting beneath our feet, as an industry grows to support monitoring programs. Through private companies, he says...                                    

Inventor of Web Calls for Digital Bill of Rights

March 12, 2014 10:08 am | by The Associated Press | News | Comments

The British inventor of the World Wide Web wants a digital bill of rights to protect Internet users from surveillance. Speaking on the 25th anniversary of his creation, Tim Berners-Lee says he hopes to spark a global conversation about the need to defend principles that have made the Web successful...

Advertisement

California Pushes to Finish Driverless Car Rules

March 12, 2014 10:05 am | by Justin Pritchard, Associated Press | News | Comments

California is trying to do something unusual in this age of rapidly evolving technology — get ahead of a big new development before it goes public. By the end of the year, the Department of Motor Vehicles must write rules to regulate cars that rely on computers — not the owner — to do the driving...

California Mulls How to Regulate 'Driverless Cars'

March 11, 2014 12:29 pm | by Justin Pritchard, Associated Press | News | Comments

California's Department of Motor Vehicles is wading into the complex question of how to regulate the use of cars that rely on computers — not people — to drive them. Once the stuff of science fiction, "Driverless cars." On Tuesday, the DMV is hearing ideas on how to integrate the cars onto public roads...

South By Southwest: Secrets, Spying, Chef Watson

March 11, 2014 10:15 am | by Barbara Ortutay, AP Technology Writer | News | Comments

FOMO —or the fear of missing out— is a common complaint at the South By Southwest Interactive festival in Austin, Texas each year. It's here, after all, that "Girls" creator Lena Dunham spoke on Monday at the same time that NSA whistleblower Edward Snowden gave a teleconferenced talk...

Computer System Simulates the Behavior of Tax Evaders

March 10, 2014 11:31 am | by Universitat Autonoma de Barcelona | News | Comments

Tax fraud is a very serious problem for society, especially in Spain, where tax evasion represents almost one-fourth of its Gross Domestic Product. On the one hand, evasion is a problem because it produces a loss in public resources, something which is especially difficult in a time of economic crisis with cutbacks in public funding...

HotSpot Episode 53: Entire Movie Shot with iPhone

March 10, 2014 10:45 am | by Alex Shanahan, Multimedia Production Specialist | Videos | Comments

This week on WDD's HotSpot, brought to you by Components Corporation, an entire movie shot with the iPhone; a fiber cable system that eliminates the complexities of small cell installation; high-frequency electrical stimulus to heal chronic wounds; and taking finger gestures to the next level...                   

Advertisement

Stanford Engineers Create a Software Tool to Reduce the Cost of Cloud Computing

March 10, 2014 10:28 am | by Tom Abate, Stanford Engineering | News | Comments

We hear a lot about the future of computing in the cloud but not much about the efficiency of data centers, those facilities where clusters of server computers work together to host applications ranging from social networks to big data analytics...                      

Inspire Young Women to Pursue Careers in Technology

March 10, 2014 10:12 am | by Tom Abate and Priya Ganesan, Stanford Engineering | Videos | Comments

The videos are aimed at high school and young college students, teachers, and counselors. But the Stanford undergraduates who made the videos hope that parents will share the interviews with children to help them expand their horizons...                   

Silicon Valley Women Star in Video Series Urging Young Women to Study Computing

March 10, 2014 10:07 am | by Tom Abate and Priya Ganesan, Stanford Engineering | News | Comments

Many people talk about encouraging young women to study computer science. Now some female undergraduates at Stanford hope to do just that by starting an online video library that features motivational interviews with Silicon Valley women in computing...                   

A Timeline of GPS Technology

March 7, 2014 4:28 pm | by Robert J. Hall, Track Your Truck | Blogs | Comments

As we tool around the countryside under the direction of that helpful box on the dashboard, it's easy to believe that GPS is the latest and greatest invention to hit the pike. It may come as a surprise to learn that the idea actually got off to its rocky start back in 1959...

Wireless Energy Harvesting to Power the Internet of Things

March 7, 2014 3:59 pm | by Marlee Rosen, Principal Analyst, Rosen Associates | Articles | Comments

Internet technology will move from being something that is kind of independent of us to something that is literally woven into our daily existence. From your shoes to your shirt, stove to your toilet, the future may be found in connecting every part of our lives...

Advertisement

Software Analyzes Apps for Malicious Behavior

March 7, 2014 3:39 pm | by Saarland University | News | Comments

Last year at the end of July the Russian software company "Doctor Web" detected several malicious apps in the app store "Google Play." Downloaded on a smartphone, the malware installed — without the permission of the user — additional programs which sent expensive text messages to premium services...

Engineering Newswire 80: Body-Mounted Joystick Gives Astronauts Touch-Feedback

March 7, 2014 9:02 am | by Alex Shanahan, Multimedia Production Specialist | Videos | Comments

Today on Engineering Newswire, we’re getting touchy feely with a body-mounted joystick, 3D printing heart attack predictors, and installing a fifth eye. This episode features ...          

Collecting Digital User Data without Invading Privacy

March 6, 2014 12:31 pm | by Saarland University | News | Comments

The statistical evaluation of digital user data is of vital importance for analyzing trends. But it can also undermine the privacy. Computer scientists from Saarbrücken have now developed a novel cryptographic method that makes it possible to collect data and protect the privacy of the user at the same time...

Withdrawing Money at Cash Machines with Google Glass

March 6, 2014 11:48 am | by Saarland University | News | Comments

Taking photos with a wink, checking one's calendar with a glance of the right eye, reading text messages — the multinational cooperation Google wants to make it possible with Google Glass. But what IT experts celebrate as a new milestone makes privacy groups skeptical...

Increased Power Efficiency for Future Computer Processors

March 6, 2014 11:23 am | by University of California - Los Angeles | News | Comments

Have you ever wondered why your laptop or smartphone feels warm when you're using it? That heat is a byproduct of the microprocessors in your device using electric current to power computer processing functions — and it is actually wasted energy. Now, a team led by researchers has made major improvements...

Dubai Focuses on Technology in 'Smart City' Bid

March 5, 2014 4:29 pm | by The Associated Press | News | Comments

After years of chasing the biggest and the best, the fast-growing Mideast city of Dubai is turning to technology to help the little things in life run more smoothly. Government officials presented a wide range of projects that are aimed at turning Dubai into what they're calling a "smart city" ahead of its hosting of the 2020 World Expo...

Seeking Quantum-ness: D-Wave Chip Passes Rigorous Tests

March 5, 2014 3:47 pm | by University of Southern California | News | Comments

With cutting-edge technology, sometimes the first step scientists face is just making sure it actually works as intended. The USC Viterbi School of Engineering is home to the USC-Lockheed Martin Quantum Computing Center, a super-cooled, magnetically shielded facility specially built to house the first commercially available quantum computing processors...

Low-Cost Long-Range Radio Solution For M2M and Internet Of Things

March 5, 2014 3:30 pm | by Actility | News | Comments

Actility and Semtech Corporation have unveiled ThingPark Wireless, an innovative, low-cost long-range bidirectional radio solution allowing M2M sensor OEMs and application providers to significantly improve market adoption. ThingPark Wireless is based on Semtech’s ultra-long range, bidirectional LoRa radio transceivers...

Why is ZigBee Green?

March 5, 2014 3:04 pm | by Cees Links, CEO and Founder of GreenPeak, ZigBee Alliance Member | Blogs | Comments

One of the biggest challenges that consumers and service providers will have in the future is maintaining a wide range of sensor and control devices located throughout the Smart home. For ease of use and installation, it makes much more sense to have these powered by either batteries or by energy harvesting technologies...

Copied from Nature: Detecting Software Errors via Genetic Algorithms

March 5, 2014 1:01 pm | by Saarland University | News | Comments

According to a current study from the University of Cambridge, software developers are spending about the half of their time on detecting errors and resolving them. Projected onto the global software industry, according to the study, this would amount to a bill of about 312 billion US dollars every year...

Security Tools for Industry 4.0

March 5, 2014 10:38 am | by Fraunhofer | News | Comments

An increasing number of unsecured, computer-guided production machinery and networks in production facilities are gradually evolving into gateways for data theft. New security technologies may directly shield the sensitive data that is kept there. You can hear the metallic buzz as the milling machine bores into the workpiece...

New Technique Targets C Code to Spot, Contain Malware Attacks

March 4, 2014 4:06 pm | by NC State University | News | Comments

Researchers have developed a new tool to detect and contain malware that attempts root exploits in Android devices. The tool improves on previous techniques by targeting code written in the C programming language – which is often used to create root exploit malware...

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading