Advertisement
Computing
Subscribe to Computing
View Sample

FREE WDD Email Newsletter

Inter-Dependent Networks Stress Test

August 28, 2014 3:44 pm | by Springer | News | Comments

A new study relies on a complex systems modeling approach to analyze inter-dependent networks and improve their reliability in the event of failure Energy production systems are good examples of complex systems. Their infrastructure equipment requires ancillary sub-systems structured like a network—including water for cooling...

Classroom Contest Yields Publishable Results

August 28, 2014 1:39 pm | by Massachusetts Institute of Technology | News | Comments

Students’ designs for cellular-networking protocols help define the limits of protocol performance. In the 21st century, design contests have emerged as a way to make rapid progress on tough computational problems. The million-dollar Netflix Prize, which sought to improve Netflix’s movie recommendation algorithm...

Coaxial Connectors Designed for Mobile Communications Systems

August 27, 2014 3:46 pm | by WDD Staff | Product Releases | Comments

Delta’s 4.1/9.5 Mini DIN series of coaxial connectors are designed to meet the growing demands of today’s high performance mobile communications systems...

Advertisement

Ceiling Mount Universal Wi-Fi Enclosure with MIMO Antenna

August 27, 2014 3:03 pm | by PCTEL | Product Releases | Comments

PCTEL announced its latest solution for in-building wireless networks...

TeraVM to Showcase Virtual Network Function Readiness

August 27, 2014 2:01 pm | by WDD Staff | Product Releases | Comments

Aeroflex Limited announced that Dell has chosen TeraVM, a virtualized IP test solution...

Everyday Cybercrime — and What You Can Do about It

August 27, 2014 1:42 pm | by TED | Videos | Comments

How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it's through simple things you do each day without thinking twice. James Lyne reminds us that it's not only the NSA that's watching us, but ever-more-sophisticated cybercriminal...

Hackerspaces Used to Turn Ideas Turn into Reality

August 27, 2014 9:56 am | by The Associated Press | News | Comments

Inside a nondescript garage-like workshop nestled between restaurants, a flower shop and jewelry stores along Main Street, ideas are taking shape. At HeatSync Labs, the tables are littered with computer chips, pens, pads and tools while the room is abuzz with the chatter of would-be inventors...

New Ways to Process and Analyze Big Data

August 26, 2014 7:37 pm | by Science China Press | News | Comments

Big Data presents scientists with unfolding opportunities, including, for instance, the possibility of discovering heterogeneous characteristics in the population leading to the development of personalized treatments and highly individualized services. But ever-expanding data sets introduce new challenges in terms of statistical analysis...

Advertisement

Photon Speedway Puts Big Data in the Fast Lane

August 26, 2014 7:31 pm | by DOE/Lawrence Berkeley National Laboratory | News | Comments

A series of experiments is shedding new light on the photosynthetic process. The work also illustrates how light sources and supercomputing facilities can be linked via a "photon science speedway" as a solution to emerging challenges in massive data analysis...

'Robo Brain' Will Teach Robots Everything from the Internet

August 26, 2014 12:34 pm | by Cornell University | News | Comments

Robo Brain – a large-scale computational system that learns from publicly available Internet resources – is currently downloading and processing about 1 billion images, 120,000 YouTube videos, and 100 million how-to documents and appliance manuals. The information is being translated and stored in a robot-friendly format...

Hewlett-Packard Recalls 5 Million AC Power Cords

August 26, 2014 12:26 pm | by The Associated Press | News | Comments

Hewlett-Packard Company is recalling about 5.6 million notebook computer AC power cords in this country and another 446,700 in Canada because of possible overheating, which can pose a fire and burn hazard. HP has received 29 reports of power cords overheating and melting or charring...

Photo of the Day: New Chip Design Mimics the Brain

August 26, 2014 11:05 am | by DARPA | News | Comments

DARPA-funded researchers have developed one of the world’s largest and most complex computer chips ever produced—one whose architecture is inspired by the neuronal structure of the brain and requires only a fraction of the electrical power of conventional chips...

DARPA's Computer Chip Mimics Brain's Power-Saving Efficiency

August 26, 2014 11:01 am | by DARPA | News | Comments

DARPA-funded researchers have developed one of the world’s largest and most complex computer chips ever produced—one whose architecture is inspired by the neuronal structure of the brain and requires only a fraction of the electrical power of conventional chips...

Advertisement

Enabling a New Future for Cloud Computing

August 25, 2014 4:59 pm | by National Science Foundation | News | Comments

The National Science Foundation announced two $10 million projects to create cloud computing testbeds--to be called "Chameleon" and "CloudLab"--that will enable the academic research community to develop and experiment with novel cloud architectures and pursue new, architecturally-enabled applications of cloud computing...

Transceiver Platform Provides Long Range and Connectivity

August 25, 2014 2:01 pm | by WDD Staff | Product Releases | Comments

Semtech Corporation announced its LoRa long-range RF technology...

VPX Systems to Jump Start Application Development

August 25, 2014 11:20 am | by WDD Staff | Product Releases | Comments

Pentek announced the launch of the newest member of the SPARK development systems, the Model 8267. The Model 8267 is pre-configured 3U VPX system to speed application development for the expansive family of Pentek Flexor FMC, Cobalt Virtex-6 and Onyx Virtex-7 FPGA 3U VPX software...

Keysight Technologies Receives Cyber Innovation Award

August 25, 2014 10:55 am | by Keysight Technologies | News | Comments

Keysight Technologies announced it has received an Innovation Award from the U.K. government for its research into cyber threat detection. The award was presented to the Keysight research team by Professor Nick Jennings, chief scientific adviser for U.K. National Security...

Dead Floppy Drive: Kenya Recycles Global E-Waste

August 25, 2014 12:42 am | by Corinne Chin, Associated Press | News | Comments

In an industrial area outside Kenya's capital city, workers in hard hats and white masks take shiny new power drills to computer parts. This assembly line is not assembling, though. It is dismantling some of the estimated 50 million metric tons of hazardous electronic-waste the world generated last year...

Official Says Hackers Hit up to 25,000 Fed Workers

August 25, 2014 12:41 am | by The Associated Press | News | Comments

The internal records of as many as 25,000 Homeland Security Department employees were exposed during a recent computer break-in at a federal contractor that handles security clearances, an agency official said Friday. The official, who spoke on condition of anonymity to discuss...

Amphenol Expands Pre-Configured RF Cable Assembly

August 22, 2014 10:54 am | by WDD Staff | Product Releases | Comments

Amphenol Connex has announced the expansion of their pre-configured fixed length RF cable assembly line to include standard metric lengths. These assemblies are ideal for a variety of commercial and industrial applications...                      

A Magna Carta for the Web

August 21, 2014 4:32 pm | by TED | Videos | Comments

There’s a battle ahead. Eroding net neutrality, filter bubbles and centralizing corporate control all threaten the web’s wide-open spaces. It’s up to users to fight for the right to access and openness. The question is, What kind of Internet do we want? ...

Hacking Gmail with 92 Percent Success

August 21, 2014 4:16 pm | by University of California, Riverside | News | Comments

A team of researchers have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone. The researchers tested the method and found it was successful...

Apple Bounces Back to Hit a New High

August 21, 2014 3:24 pm | by Michael Liedtke, AP Technology Writer | News | Comments

Apple's stock touched a new high Wednesday, reflecting investors' renewed faith in CEO Tim Cook's ability to outwit the competition and expand the technological hit factory built by the late Steve Jobs. The milestone represents a dramatic ...

B&N and Samsung Introduce Co-Branded Tablet

August 20, 2014 11:59 am | by Mae Anderson, AP Technology Writer | News | Comments

Barnes & Noble and Samsung on Wednesday unveiled a new co-branded tablet called the Samsung Galaxy Tab 4 Nook that will replace B&N's own Nook tablets. The 7-inch Wi-Fi tablet will sell for $179 after a $20 instant rebate, the same entry price of the non-branded Samsung Galaxy Tab 4...

New Framework Would Facilitate Use of New Android Security Modules

August 20, 2014 11:48 am | News | Comments

Computer security researchers have developed a modification to the core Android operating system that allows developers and users to plug in new security enhancements. The new Android Security Modules framework aims to eliminate the bottleneck that prevents developers...

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading