Advertisement
News
Subscribe to Wireless Design and Development

Playing Hunger Games: Are Gamified Health Apps Putting Odds in Your Favor?

August 25, 2014 5:05 pm | by Brigham Young University | Comments

At least that’s the approach of Zombies, Run!—one of more than 31,000 health and fitness apps on the market today, and one of the growing number of apps that use games to increase physical activity. Gamification is currently the popular trend for mobile fitness app makers looking to cash in to help people get fit...

TOPICS:

Enabling a New Future for Cloud Computing

August 25, 2014 4:59 pm | by National Science Foundation | Comments

The National Science Foundation announced two $10 million projects to create cloud computing testbeds--to be called "Chameleon" and "CloudLab"--that will enable the academic research community to develop and experiment with novel cloud architectures and pursue new, architecturally-enabled applications of cloud computing...

TOPICS:

Shaping the Future of Nanocrystals

August 25, 2014 4:12 pm | by Lawrence Berkeley National Laboratory | Comments

The first direct observations of how facets form and develop on platinum nanocubes point the way towards more sophisticated and effective nanocrystal design and reveal that a nearly 150 year-old scientific law describing crystal growth breaks down at the nanoscale. Researchers with the U.S. Department of Energy...

TOPICS:
Advertisement

TE Connectivity Upgrades Mobile Networks for 4G and Beyond

August 25, 2014 3:44 pm | by TE Connectivity | Comments

TE Connectivity (TE) announced that TE’s FlexWave Prism and InterReach Spectrum distributed antenna systems are now upgraded for 4G services, allowing customers currently using 2G and 3G service to deliver more capacity in their networks. Using techniques such as multiple input/multiple output, resectorization...

TOPICS:

Telit Technology Helps Address Safety Concerns in Schools and Campuses

August 25, 2014 11:04 am | by Telit Wireless Solutions | Comments

Telit Wireless Solutions has announced that the North American CE910-DUAL variant of the company’s xE910 family of unified form factor modules will be used in future versions of the Campus Eye reporting as MessageQube devices that currently utilize the CC864 module...

TOPICS:

Keysight Technologies Receives Cyber Innovation Award

August 25, 2014 10:55 am | by Keysight Technologies | Comments

Keysight Technologies announced it has received an Innovation Award from the U.K. government for its research into cyber threat detection. The award was presented to the Keysight research team by Professor Nick Jennings, chief scientific adviser for U.K. National Security...

TOPICS:

Photo of the Day: What Happens When The Boomers Retire?

August 25, 2014 9:56 am | by Adecco | Comments

Skilled trades are the foundation on which the U.S. was built. As baby boomers begin to retire from engineering jobs, and younger generations are steering clear of them, the question is: who will replace them?...    

TOPICS:

Dead Floppy Drive: Kenya Recycles Global E-Waste

August 25, 2014 12:42 am | by Corinne Chin, Associated Press | Comments

In an industrial area outside Kenya's capital city, workers in hard hats and white masks take shiny new power drills to computer parts. This assembly line is not assembling, though. It is dismantling some of the estimated 50 million metric tons of hazardous electronic-waste the world generated last year...

TOPICS:
Advertisement

Official Says Hackers Hit up to 25,000 Fed Workers

August 25, 2014 12:41 am | by The Associated Press | Comments

The internal records of as many as 25,000 Homeland Security Department employees were exposed during a recent computer break-in at a federal contractor that handles security clearances, an agency official said Friday. The official, who spoke on condition of anonymity to discuss...

TOPICS:

Gadget Watch: Get Ready for the Thermal Selfie

August 25, 2014 12:28 am | by Peter Svensson, AP Technology Writer | Comments

Tired of the selfie? Get ready for the "thermie," or as I like to call it, the "hottie." That's when you take a picture of the heat emanating from your body, using an infrared camera that attaches to the back of your iPhone. It sounds unlikely, but it's coming. Apple stores started...

TOPICS:

Lawsuits Challenge U.S. Drone, Model Aircraft Rules

August 25, 2014 12:23 am | by Joan Lowy, Associated Press | Comments

Model aircraft hobbyists, research universities and commercial drone interests filed lawsuits Friday challenging a government directive that they say imposes tough new limits on the use of model aircraft and broadens the agency's ban on commercial drone flights...

TOPICS:

Gov'T Warns U.S. Retailers about Hacking Software

August 25, 2014 12:19 am | by The Associated Press | Comments

More than 1,000 U.S. retailers could be infected with malicious software lurking in their cash register computers, allowing hackers to steal customer financial data, the Homeland Security Department said Friday. The government urged businesses of all sizes to scan their point-of-sale systems for software...

TOPICS:

Two Europe Navigation Satellites in the Wrong Orbits

August 24, 2014 11:31 pm | by The Associated Press | Comments

European space officials say they're investigating whether the inaccurate deployment of two satellites will complicate their efforts to develop a new Galileo satellite navigation system that would rival America's GPS network. The European Space Agency and launch company Arianespace...

TOPICS:

Luxury Fashion Takes on Fitness Technology

August 24, 2014 11:24 pm | by Leanne Italie, Associated Press | Comments

Luxury fashion is making inroads in wearable tech as more designers try their hands at developing smart, stylish accessories and clothing aimed at tracking performance and health, or simply making connected lives easier to manage. "We actually think the fashion industry should be in the driver's seat..."

TOPICS:

Hacking Gmail with 92 Percent Success

August 21, 2014 4:16 pm | by University of California, Riverside | Comments

A team of researchers have identified a weakness believed to exist in Android, Windows and iOS mobile operating systems that could be used to obtain personal information from unsuspecting users. They demonstrated the hack in an Android phone. The researchers tested the method and found it was successful...

TOPICS:

Pages

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading