ScienceDaily: Computers and Internet News |
- Protecting laptops on the move: Theoretical model for vibrations in laptops provides design strategies for reducing hard drive failures
- Grid computing resources: Schedule algorithms based on game theory
- Cracks emerge in the cloud: Security weakness of cloud storage services
- Android security weaknesses caused by performance design identified
Posted: 19 Jun 2014 11:59 AM PDT Laptops have the advantages of being more versatile and portable than their desktop counterparts. But these attributes impose considerable demands on the electronic components in a laptop -- particularly the hard drive. The magnetic disk inside a hard drive rotates at a rate of several thousand revolutions a minute. At the same time, a read/write head moves only a few nanometers above the disk surface to access information on the disk. At such high speeds, large vibrations can permanently damage the hard drive. |
Grid computing resources: Schedule algorithms based on game theory Posted: 19 Jun 2014 11:59 AM PDT Grid computing is a powerful form of distributed computing wherein a network of loosely coupled and geographically separated computers, typically of different computational powers, work together to perform data-intensive calculations. The technology uses numerical simulations to help investigate a variety of challenging scientific problems, including the subatomic world revealed by particle accelerators like the Large Hadron Collider. |
Cracks emerge in the cloud: Security weakness of cloud storage services Posted: 19 Jun 2014 11:59 AM PDT As individual computer users increasingly access the Internet from different smartphones, tablets and laptops, many are choosing to use online cloud services to store and synchronize their digital content. Cloud storage allows consumers to retrieve their data from any location using any device and can provide critical backups in the case of hard disk failure. But while people are usually vigilant about enacting security measures on personal computers, they often neglect to consider how safe their files are in the cloud. |
Android security weaknesses caused by performance design identified Posted: 19 Jun 2014 11:46 AM PDT Researchers have identified a weakness in one of Android's security features. The research identifies an Android performance feature that weakens a software protection called Address Space Layout Randomization (ASLR), leaving software components vulnerable to attacks that bypass the protection. |
You are subscribed to email updates from Computers and Internet News -- ScienceDaily To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
No comments:
Post a Comment