Information Technology

Here you can find a summary of innovations in the fields of information and data processing and up-to-date developments on IT equipment and hardware.

This area covers topics such as IT services, IT architectures, IT management and telecommunications.

New research could lead to a significant decrease in fatal road injuries to pedestrians and cyclists

Research carried out by scientists at the University of Surrey could lead to a significant decrease in the number of pedestrians and cyclists killed each year on Europe’s roads. In-car systems have significantly improved safety for drivers and passengers, and the introduction of soft bumpers and pop-up bonnets has lowered the risk of injury to pedestrians and cyclists, but a system of new sensors currently being developed, could potentially lower the fatality rate even further.

Over 6

Giving computers the jitters helps explain human behavior

Penn State researchers have developed a computer program that mimics the results when a human appraises a task as threatening and feels worried before starting.

Dr. Frank Ritter, associate professor in the School of Information Sciences and Technology (IST), says, “In this study, we used our program to mimic the results achieved by people who can be seen as having a type of math anxiety. However, the program could also be used to study the effects of feeling threatened or worried be

Computer scientists develop wireless system to monitor volcanoes

Seismologists, Ecuadorian officials, area residents could benefit from improved data

A rumbling South American volcano has gone wireless: Computer scientists at Harvard University have teamed up with seismologists at the University of New Hampshire and University of North Carolina to fit an Ecuadorian peak with a wireless array to monitor volcanic activity. The sensors should help researchers, officials, and local residents understand and plan for eruptions of Tungarahua, one of Ec

The Information Security Dictionary — a compendium about the terms of IT-Security

Defining over 1,200 of the most commonly used words in the security field

The newly released Information Security Dictionary (1st Edition) (published by Springer Science) offers information security experts, systems analysts, policy makers, managers and students a reference tool to find the most commonly used terms in the field. The dictionary defines these terms in easy to understand language, provides more detail in Tables and easy cross-referencing leading the reader to related te

NSF Announces Two Cybersecurity Centers To Study Internet Epidemiology and "Ecology"

Centers top list of awards from NSF’s $30 million Cyber Trust program

The National Science Foundation (NSF) has announced 33 new projects from its $30 million Cyber Trust program, including two new cybersecurity research centers that will focus on eliminating plagues of Internet worms and viruses and on building better security defenses through a deeper understanding of Internet “ecology.”

“The Cyber Trust program—the centerpiece of NSF’s leadership of cybersecurity rese

Predicting the movements of a mobile phone

Predicting the movements of mobile cell phone communications systems, thus providing a guarantee of the quality of service (QoS) and offering locating services, as well as recognising imperfect texts on a dictionary basis, are two of the applications demonstrated by José Javier Astrain Escola, engineer in the Public University of Navarre. The tool that makes this task possible is one that employs fuzzy state automatas with empty chain transitions.

At the beginning of the study, this

Page
1 628 629 630 631 632 689