Advertisement
News
Subscribe to Wireless Design and Development

Less Interference, Happier Customers

August 25, 2014 4:09 pm | by CommScope | Comments

After investing billions of dollars in wireless spectrum and network infrastructure, the last thing operators want is a loose or poorly made connection degrading network performance and the user experience. But that is exactly what can happen in extra sensitive LTE networks. The evolution of wireless networks to LTE brings about increased scrutiny of the performance...

TOPICS:

TE Connectivity Upgrades Mobile Networks for 4G and Beyond

August 25, 2014 3:44 pm | by TE Connectivity | Comments

TE Connectivity (TE) announced that TE’s FlexWave Prism and InterReach Spectrum distributed antenna systems are now upgraded for 4G services, allowing customers currently using 2G and 3G service to deliver more capacity in their networks. Using techniques such as multiple input/multiple output, resectorization...

TOPICS:

Telit Technology Helps Address Safety Concerns in Schools and Campuses

August 25, 2014 11:04 am | by Telit Wireless Solutions | Comments

Telit Wireless Solutions has announced that the North American CE910-DUAL variant of the company’s xE910 family of unified form factor modules will be used in future versions of the Campus Eye reporting as MessageQube devices that currently utilize the CC864 module...

TOPICS:
Advertisement

Keysight Technologies Receives Cyber Innovation Award

August 25, 2014 10:55 am | by Keysight Technologies | Comments

Keysight Technologies announced it has received an Innovation Award from the U.K. government for its research into cyber threat detection. The award was presented to the Keysight research team by Professor Nick Jennings, chief scientific adviser for U.K. National Security...

TOPICS:

Photo of the Day: What Happens When The Boomers Retire?

August 25, 2014 9:56 am | by Adecco | Comments

Skilled trades are the foundation on which the U.S. was built. As baby boomers begin to retire from engineering jobs, and younger generations are steering clear of them, the question is: who will replace them?...    

TOPICS:

Iran TV Shows off Allegedly Downed Israeli Drone

August 25, 2014 9:39 am | by Nasser Karimi, Associated Press | Comments

Iran's state TV on Monday broadcast footage purported to show an Israeli drone the country's Revolutionary Guard claimed to have shot down over the weekend near an Iranian nuclear site. The brief video, aired on the Arabic-language Al-Alam TV, shows what the channel says are parts of the drone...

TOPICS:

Dead Floppy Drive: Kenya Recycles Global E-Waste

August 25, 2014 12:42 am | by Corinne Chin, Associated Press | Comments

In an industrial area outside Kenya's capital city, workers in hard hats and white masks take shiny new power drills to computer parts. This assembly line is not assembling, though. It is dismantling some of the estimated 50 million metric tons of hazardous electronic-waste the world generated last year...

TOPICS:

Official Says Hackers Hit up to 25,000 Fed Workers

August 25, 2014 12:41 am | by The Associated Press | Comments

The internal records of as many as 25,000 Homeland Security Department employees were exposed during a recent computer break-in at a federal contractor that handles security clearances, an agency official said Friday. The official, who spoke on condition of anonymity to discuss...

TOPICS:
Advertisement

Gadget Watch: Get Ready for the Thermal Selfie

August 25, 2014 12:28 am | by Peter Svensson, AP Technology Writer | Comments

Tired of the selfie? Get ready for the "thermie," or as I like to call it, the "hottie." That's when you take a picture of the heat emanating from your body, using an infrared camera that attaches to the back of your iPhone. It sounds unlikely, but it's coming. Apple stores started...

TOPICS:

Lawsuits Challenge U.S. Drone, Model Aircraft Rules

August 25, 2014 12:23 am | by Joan Lowy, Associated Press | Comments

Model aircraft hobbyists, research universities and commercial drone interests filed lawsuits Friday challenging a government directive that they say imposes tough new limits on the use of model aircraft and broadens the agency's ban on commercial drone flights...

TOPICS:

Gov'T Warns U.S. Retailers about Hacking Software

August 25, 2014 12:19 am | by The Associated Press | Comments

More than 1,000 U.S. retailers could be infected with malicious software lurking in their cash register computers, allowing hackers to steal customer financial data, the Homeland Security Department said Friday. The government urged businesses of all sizes to scan their point-of-sale systems for software...

TOPICS:

Two Europe Navigation Satellites in the Wrong Orbits

August 24, 2014 11:31 pm | by The Associated Press | Comments

European space officials say they're investigating whether the inaccurate deployment of two satellites will complicate their efforts to develop a new Galileo satellite navigation system that would rival America's GPS network. The European Space Agency and launch company Arianespace...

TOPICS:

Luxury Fashion Takes on Fitness Technology

August 24, 2014 11:24 pm | by Leanne Italie, Associated Press | Comments

Luxury fashion is making inroads in wearable tech as more designers try their hands at developing smart, stylish accessories and clothing aimed at tracking performance and health, or simply making connected lives easier to manage. "We actually think the fashion industry should be in the driver's seat..."

TOPICS:

Ferguson Fallout: A Call for Police 'Body Cams'

August 22, 2014 9:59 am | by Barbara Ortutay, AP Technology Writer | Comments

The fatal police shooting of the unarmed black 18-year-old in Ferguson, Missouri, is prompting calls for more officers to wear so-called body cameras, simple, lapel-mounted gadgets that capture video footage of law enforcement's interactions with the public. Proponents say the devices...

TOPICS:

Hacking Gmail with 92 Percent Success

August 21, 2014 4:16 pm | by University of California, Riverside | Comments

A team of researchers have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone. The researchers tested the method and found it was successful...

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading