Related topics: software

Detecting program-tampering in the cloud

For small and midsize organizations, the outsourcing of demanding computational tasks to the cloud—huge banks of computers accessible over the Internet—can be much more cost-effective than buying their own hardware. But ...

Researchers develop model of 'near-optimal' genetic code

Researchers have created a model that may explain the complexities of the origins of life. Their work, which appears in the Journal of the Royal Society Interface, offers new insights into how RNA signaling likely developed ...

Scientists find asymmetry in topological insulators

New research shows that a class of materials being eyed for the next generation of computers behaves asymmetrically at the sub-atomic level. This research is a key step toward understanding the topological insulators that ...

Studies: Cyberspying targeted SKorea, US military

The hackers who knocked out tens of thousands of South Korean computers simultaneously this year are out to do far more than erase hard drives, cybersecurity firms say: They also are trying to steal South Korean and U.S. ...

Android antiviral products easily evaded, study says

Think your antivirus product is keeping your Android safe? Think again. Northwestern University researchers, working with partners from North Carolina State University, tested 10 of the most popular antiviral products for ...

Scientists develop advanced biological computer

(Phys.org) —Using only biomolecules (such as DNA and enzymes), scientists at the Technion-Israel Institute of Technology have developed and constructed an advanced biological transducer, a computing machine capable of manipulating ...

From eardrums to electromagnetics, researcher hears the problems

A good tool is both robust and accurate; it doesn't break down easily, or give faulty readings or results. This standard applies to everything from a bathroom scale, or vending machine to a sniper rifle. It also rings true ...

page 8 from 18