Here you can find a summary of innovations in the fields of information and data processing and up-to-date developments on IT equipment and hardware.
This area covers topics such as IT services, IT architectures, IT management and telecommunications.
Brooktrout Technology, Inc., a leading provider of innovative hardware and software platforms that enable applications for the New Network(TM), today announced that e-horizon Streaming Technologies, a leading provider of Next Generation Streaming Media solutions for Packet Switched data and telecommunication networks, has selected Brooktrouts TR2020(TM) platform for their VoiPZon Gateway
e-horizons VoiPZon system enables network operators and service providers to offer val
University of Delaware researchers have developed a revolutionary computer interface technology that promises to put the bite on the traditional mouse and mechanical keyboard.
“This is not just a little step in improving the mouse, this is the first step in a new way of communicating with the computer through gestures and the movements of your hands. This is, after all, one of the ways humans interact.” John Elias, UD professor of electrical and computer engineering, said.
Academy of Finland showed the way at Science Exhibition
The art of walking through walls made real
Walking through walls has just become possible. Senior researcher Ismo Rakkolainen and Professor Karri Palovuori from Tampere University of Technology have pioneered a fog display that is physically penetrable. A prototype of the screen was introduced to the public for the first time at the Academy of Finland stand at the Turku Science Exhibition on 4-6 October 2002. International
Researchers from Oxford University’s Computing Laboratory have developed techniques to spot malicious attacks on computer networks, that include the use of Inductive Logic Programming (ILP) techniques to automatically determine the semantics of novel attack strategies.
Intrusions often take place where there are vulnerabilities within computer systems. For example, one of the most common of these is the buffer overflow, where an attacker sends overly long transactions to a server. The aim i
Pairing a real dancer with an animated dance partner is nothing new – it’s a technique used in any number of movies or television shows. But collaborating artists and engineers at the University of Illinois at Urbana-Champaign are putting a new spin on the idea.
Working with engineers in the Beckman Institute for Advanced Science and Technology at Illinois, visiting Beckman scholar Yu Hasegawa-Johnson is the visionary behind a real-time, high-tech pas de deux by dancers located thousands of
Penn State engineers have developed an economical way to more efficiently manage radio spectrum use and prevent interference on wireless broadband systems for high-speed Internet access – potentially bringing down costs for consumers. Dr. Mohsen Kavehrad, director of Penn States Center for Information and Communications Technology Research (CICTR), says, “With this technique, service providers could offer quality service to more homes using only a limited span of the radio spectrum. And, if pro