Advertisement
Computers
Subscribe to Computers

The Lead

The 2015 Ethernet Roadmap provides practical guidance to the development of Ethernet, and offers an in-depth look at Ethernet’s accelerating evolution and expansion in four key areas: consumer and residential; enterprise and campus; hyperscale data center

Ethernet Alliance Unveils Detailed Roadmap

March 25, 2015 1:57 pm | by Ethernet Alliance | News | Comments

The Ethernet Alliance, a global consortium dedicated to the continued success and advancement of Ethernet technologies, has released the 2015 Ethernet Roadmap. The first-ever publicly available industry roadmap will outline the ongoing development and evolution of Ethernet through the end of the decade. Ethernet, the world’s most widely adopted networking technology, saw a period of rapid change and diversification in 2014.

“Nobel Prize in Computing” goes to MIT Database Systems Architecture Pioneer

March 25, 2015 1:44 pm | by Association for Computing Machinery | News | Comments

The Association for Computing Machinery has named Michael Stonebraker of MIT recipient of the...

Solving the Trust Equation: Socially Intelligent Computers can turn Difficult Negotiations into Win-win Situations

March 25, 2015 12:19 pm | by A*STAR Institute of High Performance Computing | News | Comments

Programming fundamental social intelligence skills into software agents can make humans...

Help NASA Explore the Universe with Free Asteroid Data Hunter App

March 23, 2015 11:35 am | by NASA | News | Comments

During a panel at the South by Southwest Festival, NASA representatives discussed how citizen...

View Sample

FREE Email Newsletter

The aim of Public Encryption is to bring end-to-end encryption to the masses. © Fraunhofer SIT

Cryptography for Everyone: Bringing End-to-end Encryption to the Masses

March 17, 2015 2:42 pm | by Fraunhofer-Gesellschaft | News | Comments

In the wake of the revelations that intelligence agencies have been engaged in mass surveillance activities, both industry and society at large are looking for practicable encryption solutions that protect businesses and individuals. Previous technologies have failed in practice because they were too expensive or not user friendly enough. An open initiative called “Volksverschlüsselung” aims to bring end-to-end encryption to the masses.

Mellanox Multi-Host

Mellanox Multi-Host

March 17, 2015 2:06 pm | Mellanox Technologies, Inc. | Product Releases | Comments

Mellanox Multi-Host is designed to provide flexibility and savings in building next-generation, scalable Cloud, Web 2.0 and high-performance data centers. The technology enables designing and building new scale-out heterogeneous compute and storage racks with direct connectivity between compute elements, storage elements and the network.

Chalcogenide glass: Using conventional fiber drawing techniques, microfibers can be produced from chalcogenide (glasses based on sulphur) that possess a variety of broadband photoinduced effects, which allow the fibers to be switched on and off.

Optical Fibers Light Way for Brain-like Computing

March 11, 2015 12:36 pm | by University of Southampton | News | Comments

Computers that function like the human brain could soon become a reality thanks to new research using optical fibers made of specialty glass, which has the potential to allow faster and smarter optical computers capable of learning and evolving. Researchers have demonstrated how neural networks and synapses in the brain can be reproduced, with optical pulses as information carriers, using special fibers made from chalcogenides.

Advertisement
Before scientists develop a full quantum computer, quantum physicists will have to create circuitry that takes advantage of the marvelous computing prowess promised by the quantum bit (“qubit”), while compensating for its high vulnerability to environment

Quantum Device Detects and Corrects Own Errors

March 5, 2015 9:24 am | by Sonia Fernandez, UC Santa Barbara | News | Comments

Before scientists develop a full quantum computer, quantum physicists will have to create circuitry that takes advantage of the marvelous computing prowess promised by the quantum bit (“qubit”), while compensating for its high vulnerability to environmentally-induced error.

Facebook CEO Mark Zuckerberg arrives for a press conference at the Mobile World Congress, the world's largest mobile phone trade show in Barcelona, Spain, March 2, 2015. (AP Photo/Manu Fernandez)

Google, Facebook Update Contrasting Plans to Connect World

March 3, 2015 9:25 am | by Joseph Wilson, Associated Press | News | Comments

Sci-fi solutions or making friends one at a time? Google and Facebook are taking different routes to expanding Internet use and access among the unconnected in developing countries. The two Internet giants gave updates on their efforts — and differing approaches — at the Mobile World Congress wireless show in Barcelona on March 2, 2015.

Russia's defense ministry is establishing its own cyber command responsible for offensive activities, "including propaganda operations and inserting malware into enemy command and control systems." Courtesy of Contando Estrelas

Russian Cyber Threat more Severe than Previously Assessed

February 26, 2015 1:11 pm | by Ken Dilanian, AP Intelligence Writer | News | Comments

The U.S. has elevated its appraisal of the cyber threat from Russia, the U.S. intelligence chief said February 26, 2015, as he delivered the annual assessment by intelligence agencies of the top dangers facing the country. "While I can't go into detail here, the Russian cyber threat is more severe than we had previously assessed," James Clapper, the director of national intelligence, told the Senate Armed Services Committee.

As a flying laboratory, ESA's OPS-SAT will test and validate new techniques in mission control and on-board systems. It will be operated by ESA's European Space Operations Centre as a test and validation resource for over 100 European industrial partners

Flying Software Lab to Test Radically New Experimental Control Systems

February 26, 2015 8:35 am | by Suzanne Tracy, Editor-in-Chief, Scientific Computing and HPC Source | News | Comments

ESA is developing a mini-satellite to test out radically new control systems and techniques and to demonstrate drastically improved mission control capabilities that will arise when satellites can fly more powerful on-board computers. Known as Ops-Sat, it is made up of three CubeSat units with deployable solar panels. Although only 30 cm high, it contains an experimental computer 10 times more powerful than any current spacecraft.

Rather than using clear text, HTTP/2 is now a binary protocol which is quicker to parse and more compact in transmission. Courtesy of Rock1997

Upgrade to Core HTTP Protocol Promises Speedier, Easier Web

February 23, 2015 4:13 pm | by Peter Maynard, Queen's University Belfast | News | Comments

Hypertext Transfer Protocol, HTTP, is a key component of the World Wide Web. It is the communications layer through which Web browsers request Web pages from Web servers and with which Web servers respond with the contents of the page. Like much of the internet it’s been around for decades, but a recent announcement reveals that HTTP/2, the first major update in 15 years, is about to arrive.

Advertisement
A laser pulse is split into two paths: circularly polarized pump (blue) and linearly polarized probe (red). The pump’s path length is adjustable using a delay stage so that the relative arrival time between the pump and probe can be adjusted. After the pr

New Spin on Spintronics: Radiation-resistant Material May Enable Devices in Harsh Environments

February 23, 2015 4:01 pm | by American Institute of Physics (AIP) | News | Comments

A team of researchers is exploring new materials that could yield higher computational speeds and lower power consumption, even in harsh environments. Most modern electronic circuitry relies on controlling electronic charge within a circuit, but this control can easily be disrupted in the presence of radiation. Electronics that use spintronics may offer an alternative that is robust even in radiation-filled environments.

id the National Security Agency plant spyware deep in the hard drives of thousands of computers used by foreign governments, banks and other surveillance targets around the world?  A new report from Russian cybersecurity firm Kaspersky Lab said its resear

Cyber Espionage: Seagate, Western Digital, Toshiba, IBM Products Reported Compromised

February 18, 2015 9:36 am | by Brandon Bailey, AP Technology Writer | News | Comments

Did the National Security Agency plant spyware deep in the hard drives of thousands of computers used by foreign governments, banks and other surveillance targets around the world? A new report from Russian cybersecurity firm Kaspersky Lab said its researchers identified a new family of malicious programs or worms that infected computers in multiple countries, primarily overseas.

Apple CEO Tim Cook, right, watches as President Barack Obama speaks during a summit on cybersecurity and consumer protection at Stanford University in Palo Alto, CA. (AP Photo/Evan Vucci)

Obama calls on Silicon Valley to help thwart Cyber Attacks

February 17, 2015 2:15 pm | by Darlene Superville and Martha Mendoza, Associated Press | News | Comments

Cyberspace is the new "Wild West," President Barack Obama said, with everyone looking to the government to be the sheriff. But he told the private sector it must do more to stop cyber attacks aimed at the U.S. every day. Obama signed an executive order aimed at making it easier for private firms to have access to classified information about cyber attacks.

The IoT concept is much broader today, with the possibility of networking national and even international infrastructure for improved transport, weather forecasting, earthquake prediction and response, disease tracking and control and many other applicati

Internet of Things Reality Check: Obstacles may limit a Connected World

February 13, 2015 11:31 am | by Inderscience | News | Comments

Connecting different kinds of devices, not just computers and communications devices, to the Internet could lead to new ways of working with a wide range of machinery, sensors, domestic and other appliances. Researchers suggest that we are on the verge of another technological revolution, but practicalities and legal obstacles may stymie the development of the so-called Internet of Things (IoT) if they are not addressed quickly.

Seagate EVault Backup Target Appliance

Seagate EVault Backup Target Appliance

February 13, 2015 10:16 am | Seagate Technology, LLC | Product Releases | Comments

The Seagate EVault Backup Target Appliance is a backup device for large enterprises and service providers seeking data protection for multiple operating systems and appliances, including Oracle databases. It is based on Seagate’s hybrid cloud model, which supports environments where both private (on-premise) and public (off-premise) storage is used.

Advertisement
Researchers are reporting a fascinating discovery that provides insight into how the brain makes sense of data from fingers.Courtesy of Quinn Dombrowski

Bringing Texture to Touchscreens: How the Brain Makes Sense of Data from Fingers

February 12, 2015 2:31 pm | by Megan Fellman, Northwestern University | News | Comments

What if the touchscreen of your smartphone or tablet could touch you back? What if touch was as integrated into our ubiquitous technology as sight and sound? Northwestern University and Carnegie Mellon University researchers now report a fascinating discovery that provides insight into how the brain makes sense of data from fingers.

Artist’s depiction of light traveling through a photonic crystal superlattice, where holes have been randomly patterned. The result is a more narrow beam of light. Courtesy of Nicoletta Barolini

More Precise Information Transfer in Computer Chips Using Disorder to Control Light

February 4, 2015 2:56 pm | by Matthew Chin, UCLA | News | Comments

A breakthrough could lead to the more precise transfer of information in computer chips, as well as new types of optical materials for light emission and lasers. Researchers were able to control light at tiny lengths around 500 nanometers — smaller than the light’s own wavelength — by using random crystal lattice structures to counteract light diffraction. The discovery could begin a new phase in laser collimation.

The IBM-SUNY Poly partnership expands beyond Albany, as SUNY Poly continues its explosive growth across New York.

IBM Research to Lead Advanced Computer Chip R&D at SUNY Poly

February 2, 2015 11:47 am | by IBM | News | Comments

IBM and SUNY Polytechnic Institute (SUNY Poly) have announced that more than 220 engineers and scientists who lead IBM's advanced chip research and development efforts at SUNY Poly's Albany Nanotech campus will become part of IBM Research, the technology industry's largest and most influential research organization.

SciNet displays a range of keywords and topics in a topic radar. With the help of the directions on the radar, the engine displays how these topics are related to each other. The relevance of each keyword is displayed as its distance from the center point

SciNet Search Engine Helps Find Relevant, Diverse Results Faster

January 28, 2015 2:52 pm | by Alto University | News | Comments

A new search engine outperforms current ones, and helps people to do searches more efficiently. The SciNet search engine is different because it changes Internet searches into recognition tasks, by showing keywords related to the user’s search in topic radar. People using SciNet can get relevant and diverse search results faster, especially when they do not know exactly what they are looking for or how to formulate a query to find it.

The intelligent keyboard records each letter touched, but also captures information about the amount of force applied to the key and the length of time between one keystroke and the next. Such typing style is unique to individuals, and so could provide a

Self-powered Intelligent Keyboard could Provide New Layer of Biometric Security

January 27, 2015 10:12 am | by John Toon, Georgia Institute of Technology | News | Comments

By analyzing such parameters as the force applied by key presses and the time interval between them, a new self-powered non-mechanical intelligent keyboard could provide a stronger layer of security for computer users. The self-powered device generates electricity when a user’s fingertips contact the multi-layer plastic materials that make up the device.

Einstein-Podolsky-Rosen (EPR) quantum mechanics paradox

Extending Einstein's Spooky Actions for Use in Quantum Networks

January 26, 2015 4:18 pm | by Swinburne University of Technology | News | Comments

Researchers have demonstrated that the 1935 Einstein-Podolsky-Rosen quantum mechanics paradox may be extended to more than two optical systems, paving the way for exploration of larger quantum networks. The experiment also identified properties that may be useful in establishing secure quantum communication networks where shared sequences of numbers created between two parties need to be kept secret from a third party.

LE-OFETs are being used to develop flexible, transparent computer screens. Copyright RDECOM/CC

Transistor Improvements on Track to make Flexible Plastic Computers a Reality

January 26, 2015 2:03 pm | by National Institute for Materials Science | News | Comments

Researchers at Japan’s National Institute for Materials Science revealed that improvements should soon be expected in the manufacture of transistors that can be used to make flexible, paper-thin computer screens.The scientists reviewed the latest developments in research on photoactive organic field-effect transistors; devices that incorporate organic semi-conductors, amplify weak electronic signals, and either emit or receive light.

A notebook by Alan Turing, the World War II code-breaking genius depicted by Benedict Cumberbatch in the Oscar-nominated "The Imitation Game," is shown in a special preview at Bonhams auctioneers. The 56-page manuscript, containing Turing's complex mathem

British Code Breaker Alan Turing's Notebook Goes to Auction

January 26, 2015 1:33 pm | by AP | News | Comments

A handwritten notebook by Alan Turing, the World War II code-breaking genius depicted by Benedict Cumberbatch in the Oscar-nominated The Imitation Game, is going on the auction block. The 56-page manuscript was written at the time the British mathematician and computer science pioneer was working to break the seemingly unbreakable Enigma codes used by the Germans throughout World War II. It is expected to bring at least $1 million.

Dream it. Code it. Win it. is different from traditional competitions or hackathons, which focus on coding. The contest is judged on the quality of the problem being tackled, as well as the solution.

Dream it. Code it. Win it. Programming Competition Launches

January 23, 2015 2:15 pm | by TradingScreen | News | Comments

The MIT Enterprise Forum of New York and TradingScreen have announced the launch of the second annual award-winning “ Dream it. Code it. Win it. “ contest. The $50,000 student coding competition rewards and promotes creativity, diversity and literacy in the field of computer science.

The Repository of Industrial Security Incidents is a database of incidents of a cybersecurity nature that have (or could have) affected process control, industrial automation or Supervisory Control and Data Acquisition (SCADA) systems.

Cybersecurity Expert Warns Not Enough Being Done to Prevent Highly Destructive Cyberattacks on Critical Infrastructure

January 21, 2015 1:13 pm | by International Society of Automation | News | Comments

Inadequate training and a culture of complacency among many owners and operators of critical infrastructure are significantly raising the risks of highly damaging cyberattack throughout the world. That’s the viewpoint expressed by Steve Mustard, an industrial cybersecurity subject-matter expert and consultant with extensive development and management experience in real-time embedded equipment and automation systems.

President Barack Obama speaks at the National Cybersecurity and Communications Integration Center in Arlington, VA, January 13, 2015. Obama renewed his call for Congress to pass cybersecurity legislation, including a proposal that encourages companies to

Obama Unveils Cybersecurity Proposals in Advance of State of the Union Address

January 14, 2015 11:46 am | by Jack Gillum, Associated Press | News | Comments

President Barack Obama has said that recent cyberthreats to Sony and the military's U.S. Central Command are reminders of the serious threats facing the nation. Obama laid out plans on January 13, 2015, as part of a push for new cybersecurity legislation that increases government information-sharing and protects businesses from lawsuits for revealing cyberthreats.

Measuring side-channel signals2: Georgia Tech researcher Alenka Zajic measures electromagnetic emissions from various components of a desktop computer. The researchers have studied emissions from desktop and laptop computers, as well as cellphones.

Countering Side-channel Hacker Attacks

January 14, 2015 11:35 am | by Georgia Institute of Technology | News | Comments

If you’re sitting in a coffee shop, tapping away on your laptop, feeling safe from hackers because you didn’t connect to the shop’s Wi-Fi, think again. The bad guys may be able to see what you’re doing just by analyzing the low-power electronic signals your laptop emits, even when it’s not connected to the Internet. Side-channel signals could provide hackers with another way to see what the devices are doing.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading