The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
People forced to live apart for a while often miss the subtle clues that tell one person how the other feels or what he or she is doing. Media Lab Europe developed a virtual table that provides insight by relaying images of what's on your table, giving another person clues to any changes in your daily life. Researchers in Dublin, Ireland, put unique RFID tags on items that people normally place on...
The formation of collaboration networks (or communities) is an important latent effect in many computational science undertakings. Generally, collaboration networks bring together participants who wish to achieve some common goal or outcome (often over short time frames). Increasingly, scientific collaborations are becoming interdisciplinary, and scientists are working in informal collaborations to...
Internet2 products are now indispensable in the research environment. Over 200 US universities lead Internet2, a not-for-profit consortium with many projects in the works. For the networking community, the centerpiece is Abilene, a networking infrastructure available to consortium members. Already very fast and very high-performance, Abilene is being upgraded. Soon it should be able to move data at...
A multimedia storage system plays a vital role for the performance and scalability of multimedia servers. To handle the server load imposed by increased user access to on-demand multimedia streaming applications, new storage system solutions are needed. Multimedia storage systems store and retrieve data from storage devices and manage related issues including data placement, scheduling, file management,...
The Pentagon's recent decision not to allow online voting in the upcoming US presidential election came as a blow to many e-voting proponents. Pentagon officials halted plans to roll out the Defense Department's Secure Electronic Registration and Voting Experiment during the upcoming general election after four prominent security researchers issued a report detailing the system's security vulnerabilities...
The semantic Web aims to enrich the existing Web with a layer of machine-interpretable metadata so that a computer program can draw conclusions (that is, derive new information) predictably (that is, all programs that receive this information draw the same conclusions from it). The semantic Web has two motivators. The first is data integration, which is a significant bottleneck in many IT applications...
Among technopolitical idealists, the organizational structure guiding the Internet's development stands as one of the last collegial meritocracies. For almost two decades, the Internet Engineering Task Force's unofficial creed of "rough consensus and running code" has well served those who contribute to protocol development and the Internet at large. The most recent attempt at launching...
As people use computers more and more, it's increasingly challenging to ensure they can all interact and share data without making proprietary or personal information too widely available to others. The Cambridge-MIT Institute is focusing its research efforts on pervasive computing challenges, including security, networking, and user interfaces. CMI invests more than US$5 million to explore ways to...
Bot software sounds a bit like a low-budget horror movie, but it's quietly making trouble and stealing data right now, using millions of PCs worldwide. These malicious pieces of code, often compared to an undercover army of robots, invade a PC and use its computing power to do someone else's dirty work - most often without the PC owner's knowledge. The infected PC, known as a Zombie, becomes another...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.