Information Technology

Here you can find a summary of innovations in the fields of information and data processing and up-to-date developments on IT equipment and hardware.

This area covers topics such as IT services, IT architectures, IT management and telecommunications.

e-horizon Builds Next-Generation IP Gateway Using Brooktrout’s Award-Winning TR2020 Platform

Brooktrout Technology, Inc., a leading provider of innovative hardware and software platforms that enable applications for the New Network(TM), today announced that e-horizon Streaming Technologies, a leading provider of Next Generation Streaming Media solutions for Packet Switched data and telecommunication networks, has selected Brooktrout’s TR2020(TM) platform for their VoiPZon Gateway

e-horizon’s VoiPZon system enables network operators and service providers to offer val

UD researchers develop revolutionary computer interface technology

University of Delaware researchers have developed a revolutionary computer interface technology that promises to put the bite on the traditional mouse and mechanical keyboard.

“This is not just a little step in improving the mouse, this is the first step in a new way of communicating with the computer through gestures and the movements of your hands. This is, after all, one of the ways humans interact.” John Elias, UD professor of electrical and computer engineering, said.

Elias an

The art of walking through walls made real

Academy of Finland showed the way at Science Exhibition
The art of walking through walls made real

Walking through walls has just become possible. Senior researcher Ismo Rakkolainen and Professor Karri Palovuori from Tampere University of Technology have pioneered a fog display that is physically penetrable. A prototype of the screen was introduced to the public for the first time at the Academy of Finland stand at the Turku Science Exhibition on 4-6 October 2002. International

Advances in Computer Network Intrusion Detection

Researchers from Oxford University’s Computing Laboratory have developed techniques to spot malicious attacks on computer networks, that include the use of Inductive Logic Programming (ILP) techniques to automatically determine the semantics of novel attack strategies.

Intrusions often take place where there are vulnerabilities within computer systems. For example, one of the most common of these is the buffer overflow, where an attacker sends overly long transactions to a server. The aim i

Dancer to perform with distant computer-generated character

Pairing a real dancer with an animated dance partner is nothing new – it’s a technique used in any number of movies or television shows. But collaborating artists and engineers at the University of Illinois at Urbana-Champaign are putting a new spin on the idea.

Working with engineers in the Beckman Institute for Advanced Science and Technology at Illinois, visiting Beckman scholar Yu Hasegawa-Johnson is the visionary behind a real-time, high-tech pas de deux by dancers located thousands of

Allocation technique boosts efficiency, minimizes interference for wireless internet broadband

Penn State engineers have developed an economical way to more efficiently manage radio spectrum use and prevent interference on wireless broadband systems for high-speed Internet access – potentially bringing down costs for consumers. Dr. Mohsen Kavehrad, director of Penn State’s Center for Information and Communications Technology Research (CICTR), says, “With this technique, service providers could offer quality service to more homes using only a limited span of the radio spectrum. And, if pro

Page
1 687 688 689 690 691 699