TechNews Pictorial PriceGrabber Video Thu Nov 28 11:38:02 2024

PopYard--computer

[First][Next][Previous] Page 45
| computer | electronics | industries | education | careers | government | business |

  • Scientists Help Explain Visual Systemp~ps Remarkable Ability - Salk Institute for Biological Studies (7878 bytes) (2013-07-05)
  • Douglas Engelbart, Father of the Computer Mouse, Dies at Age - JOANNA STERN (2415 bytes) (2013-07-05)
  • How Relevant Are Computing Behemoths? - George Putic (2368 bytes) (2013-07-03)
  • Computer Programs Improve Fingerprint Grading - Hannah Y. Cheng (3538 bytes) (2013-07-03)
  • Hip-hip-Hadoop: Data mining for science - University of Texas at Austin (14164 bytes) (2013-07-02)
  • An intelligent robot to exterminate Internet bugs - Ecole Polytechnique Federale de Lausann (2695 bytes) (2013-07-02)
  • New hardware design makes data encryption more secure by dis - Larry Hardesty (4859 bytes) (2013-07-02)
  • Teaching a computer to play concentration advances security, - North Carolina State University (4167 bytes) (2013-07-01)
  • Algorithm Finds Best Routes for One-Way Car Sharing - Jennifer Chu (7559 bytes) (2013-06-30)
  • Book Excerpt: Fundamental Cloud Architectures - Thomas Erl, Ricardo Puttini, Zaigham Ma (29205 bytes) (2013-06-29)
  • Keeping Networks Under Control: New Approach Can Control Lar - Megan Fellman (5756 bytes) (2013-06-28)
  • Low energy consumption circuit for neural network systems wi - Panasonic Corporation (3986 bytes) (2013-06-27)
  • Disable Java? Tech experts say p~~pyesp~~p - Byron Acohido (5623 bytes) (2013-06-26)
  • Programming Model for Supercomputers of the Future - Dirk Mahler (3420 bytes) (2013-06-26)
  • Security standard proposed for apps - Olivia Goldhill (2623 bytes) (2013-06-26)
  • Wealth of words: Technology company analyzes social-media co - Rob Matheson (6346 bytes) (2013-06-25)
  • New method to magnify digital images is 700 times faster - Elhuyar Fundazioa (4642 bytes) (2013-06-24)
  • Team creates techniques for high quality, high resolution st - Disney Research (3528 bytes) (2013-06-24)
  • New algorithm finds best routes for one-way car sharing - Massachusetts Institute of Technology (7346 bytes) (2013-06-24)
  • An active approach to digital archives - PRESTOPRIME project (6496 bytes) (2013-06-24)
  • New study suggests Voynich text is not a hoax - Bob Yirka (2590 bytes) (2013-06-24)
  • 100-year-old hoax may be 600-year-old code - Ruth Brown (1079 bytes) (2013-06-24)
  • Five Big Questions About Big Data Encryption - David Tishgart (4063 bytes) (2013-06-23)
  • Computer pioneer Harry Huskey honored for lifetime contribut - Jennifer Pittman (5180 bytes) (2013-06-23)
  • Working Backward: Computer-Aided Design of Zeolite Templates - Ramdas Pophale (5097 bytes) (2013-06-19)
  • Gordon: A Non-Conventional Supercomputer - Jan Zverina (9411 bytes) (2013-06-17)
  • Automated p~pCoachp~p Could Help With Social Interactions - David L. Chandler (4370 bytes) (2013-06-15)
  • 12 things you may not have known about OS X Mavericks - Serenity Caldwell (5102 bytes) (2013-06-13)
  • Cray Launches New Hadoop Solution on Cray CS300 Line of Clus - Nick Davis (6857 bytes) (2013-06-13)
  • Linguists, computer scientists use supercomputers to improve - University of Texas at Austin (8499 bytes) (2013-06-12)
  • Securing the cloud - Larry Hardesty (6684 bytes) (2013-06-12)
  • New Algorithm Solves Cloud Security Issues - Lee Rannals (2303 bytes) (2013-06-11)
  • When Will My Computer Understand Me? - Texas Advanced Computing Center (7885 bytes) (2013-06-11)
  • Scientists searching for worldp~ps first web page turn to N - CERN (6097 bytes) (2013-06-11)
  • Programming model for supercomputers of the future - Dirk Mahler (3596 bytes) (2013-06-10)
  • Securing the cloud: New algorithm solves major problem with - Larry Hardesty (6596 bytes) (2013-06-10)
  • Computer Simulations Shed New Light On How The Immune System - redOrbit (2397 bytes) (2013-06-10)
  • Algorithm Can Predict Body Mass Index from Face Photos in On - Ashik Siddique (2661 bytes) (2013-06-07)
  • Researchers Say They Can Hack Your iPhone With A Malicious C - Andy Greenberg (3574 bytes) (2013-06-04)
  • Application of face-recognition software to portrait art sho - University of California - Riverside (5370 bytes) (2013-06-03)
  • An intelligent robot to exterminate Internet bugs - C (2697 bytes) (2013-06-03)

  • © 2021 PopYard - Technology for Today!| about us | privacy policy |