e-Readers or tablet computers, for e-books?

|

An e-book reader is a mobile device designed primarily for reading digital books. The device is equipped with a screen for reading and should allow the storage of digital publications in order to make personal digital library. The digital format … Read More

Computers

|

The Columbia Supercomputer, located at the NASA Ames Research Center. A computer is a machine that manipulates data according to a set of instructions. Although mechanical examples of computers have existed through much of recorded human history, the first electronic … Read More

Computer networks

|

A computer network is a system for communication among two or more computers. Computer networks may be categorized with respect to range: personal area network (PAN) wireless PAN local area network (LAN) wireless LAN metropolitan area network (MAN) wide area … Read More

How WinFixer Infects

|

Initial message prior to infection – Disconnect from the internet before closing this! There are several ways in which WinFixer can infect a computer. Users using Internet Explorer are most susceptible, although users of other browsers, such as Firefox and … Read More

History of the machine translation

|

The idea of machine translation may be traced back to 17th century. In 1629, René Descartes proposed a universal language, with equivalent ideas in different tongues sharing one symbol. In the 1950s, The Georgetown experiment (1954) involved fully-automatic translation of … Read More

Countermeasures against blackjack card-counters

|

Counting cards in blackjack has become substantially more difficult as a result of casino countermeasures. The most common is the use of more decks, which decreases the player’s advantage, but even in the few remaining single- and double-deck games, dealers … Read More

Microsoft to buy Calista Technologies and join Citrix Systems for virtualization

|

Microsoft intends to develop in the virtualization field, with a more extensive strategy that includes the relaxing of the licensing for its virtualization software and lower prices. Virtualization is a technique for hiding the physical characteristics of computing resources from … Read More

Webmasters, take care, a trojan steals your money!

|

BitDefender has detected a new trojan, which hijacks Google text advertisements, replacing them with ads from a different provider. The threat, which is identified by BitDefender as Trojan.Qhost.WU, modifies the infected computers’ Hosts file (a local storage for domain name … Read More