Advertisement
Computing
Subscribe to Computing
View Sample

FREE WDD Email Newsletter

Seeking Quantum-ness: D-Wave Chip Passes Rigorous Tests

March 5, 2014 3:47 pm | by University of Southern California | News | Comments

With cutting-edge technology, sometimes the first step scientists face is just making sure it actually works as intended. The USC Viterbi School of Engineering is home to the USC-Lockheed Martin Quantum Computing Center, a super-cooled, magnetically shielded facility specially built to house the first commercially available quantum computing processors...

Low-Cost Long-Range Radio Solution For M2M and Internet Of Things

March 5, 2014 3:30 pm | by Actility | News | Comments

Actility and Semtech Corporation have unveiled ThingPark Wireless, an innovative, low-cost long-range bidirectional radio solution allowing M2M sensor OEMs and application providers to significantly improve market adoption. ThingPark Wireless is based on Semtech’s ultra-long range, bidirectional LoRa radio transceivers...

Why is ZigBee Green?

March 5, 2014 3:04 pm | by Cees Links, CEO and Founder of GreenPeak, ZigBee Alliance Member | Blogs | Comments

One of the biggest challenges that consumers and service providers will have in the future is maintaining a wide range of sensor and control devices located throughout the Smart home. For ease of use and installation, it makes much more sense to have these powered by either batteries or by energy harvesting technologies...

Advertisement

Copied from Nature: Detecting Software Errors via Genetic Algorithms

March 5, 2014 1:01 pm | by Saarland University | News | Comments

According to a current study from the University of Cambridge, software developers are spending about the half of their time on detecting errors and resolving them. Projected onto the global software industry, according to the study, this would amount to a bill of about 312 billion US dollars every year...

Security Tools for Industry 4.0

March 5, 2014 10:38 am | by Fraunhofer | News | Comments

An increasing number of unsecured, computer-guided production machinery and networks in production facilities are gradually evolving into gateways for data theft. New security technologies may directly shield the sensitive data that is kept there. You can hear the metallic buzz as the milling machine bores into the workpiece...

New Technique Targets C Code to Spot, Contain Malware Attacks

March 4, 2014 4:06 pm | by NC State University | News | Comments

Researchers have developed a new tool to detect and contain malware that attempts root exploits in Android devices. The tool improves on previous techniques by targeting code written in the C programming language – which is often used to create root exploit malware...

Roku Gets into Streaming-Stick Fight with Google

March 4, 2014 3:46 pm | by Michael Liedtke, AP Technology Writer | News | Comments

Roku is getting into an Internet video-streaming stick fight with Google's Chromecast. Like the similarly shaped Chromecast, Roku's thumb-sized device plugs into a TV's HDMI port and feeds Internet video through a Wi-Fi connection. The Roku device sells for $50 compared with $35 for the Chromecast...

Voters Using Smartphones Made Fewer Errors in Mock Election

March 4, 2014 10:39 am | by Rice University | News | Comments

Voters who cast their ballots via smartphones made fewer errors than they did when voting via traditional methods in a mock election, according to new research. In a first-of-its-kind study, researchers examined how smartphone-based voting systems can be incorporated into the current large-scale voting process...

Advertisement

Apple Dials Up Effort to Meld iPhone with Cars

March 3, 2014 2:43 pm | by Michael Liedtke & Tom Krisher, AP Business Writers | News | Comments

Apple is accelerating the race to make smartphone applications easier and safer to use in cars. Ferrari, Mercedes-Benz and Volvo are previewing Apple's iPhone technology for cars this week at an auto show in Geneva. The partnerships give Apple an early lead over Google's loosely knit family of Android phones...

HotSpot Episode 52: WiFi Virus Attacks Belfast and London

March 3, 2014 10:04 am | by Eric Sorensen, Coordinator of Multimedia Development | Videos | Comments

This week on WDD's HotSpot, a mobile network in a backpack for disaster situations; a WiFi virus attacks London and Belfast; a phone that place privacy and control directly in the hands of its users; and smart space spheres receive an upgrade...                    

Promise and Peril in an Ultra-connected World

March 3, 2014 9:35 am | by Anick Jesdanun, AP Technology Writer | News | Comments

We're in the beginning of a world in which everything is connected to the Internet and with one another, while powerful yet relatively cheap computers analyze all that data for ways to improve lives. Toothbrushes tell your mirror to remind you to floss. Basketball jerseys detect impending heart failure and call the ambulance for you...

The Power of Watson in the Palm of Your Hand

February 28, 2014 12:26 pm | by IBM | News | Comments

IBM has launched the IBM Watson Mobile Developer Challenge, a first of its kind, global competition to encourage developers to create mobile consumer and business apps powered by Watson. IBM announced the challenge at Mobile World Congress in Barcelona...  

Push for Web Addresses in Era of Search, Apps

February 28, 2014 11:11 am | by Anick Jesdanun, AP Technology Writer | News | Comments

In the early days, you typed in a domain name address to reach a website. Then came the ability to reach websites directly through a search engine. The mobile era brought us phone apps for accessing services without either. Yet the organization in charge of Internet addresses is pushing a major expansion in domain name suffixes...

Advertisement

Engineering Newswire 79: AirMule UAV Is a Flying Donkey

February 28, 2014 10:38 am | by Alex Shanahan, Multimedia Production Specialist | Videos | Comments

Today on Engineering Newswire, we’re driving 270 miles per hour at Kennedy, in a car, engineering face melting metal, and saving lives in a flying donkey ...              

Georgia Tech Project Ensures 'What You See Is What You Send’

February 25, 2014 4:08 pm | by Georgia Institute of Technology | News | Comments

Imagine a user who intends to send $2 to a friend through PayPal. Embedded malware in the user’s laptop, however, converts the $2 transaction into a $2,000 transfer to the account of the malware author instead. Researchers at Georgia Tech have created a prototype software...

Want Your Computer to Go Faster? Just Add Light

February 25, 2014 4:04 pm | by Northeastern University | News | Comments

Every second, your com­puter must process bil­lions of com­pu­ta­tional steps to pro­duce even the sim­plest out­puts. Imagine if every one of those steps could be made just a tiny bit more effi­cient. “It would save pre­cious nanosec­onds,” explained North­eastern Uni­ver­sity assis­tant pro­fessor of physics Swastik Kar...

Meaghan's Minute: Millions More Connected Devices Are Coming

February 25, 2014 1:28 pm | by Eric Sorensen, Coordinator of Multimedia Development | Videos | Comments

Today at Embedded World 2014 in Nuremberg, Germany, Sierra Wireless introduced the Legato platform, an open source embedded platform built on Linux and designed to simplify the development of M2M applications from the device to the cloud...

Talking in 3D

February 25, 2014 11:06 am | by Saarland University | News | Comments

Redevelopment of the London King's Cross station and the nearby neighborhood was announced in 2005 and completed with a grand opening in 2012. The internationally well-recognized engineering services firm Arup, famous among other things for their work...

System that Automatically Fills Gaps in Programmers' Code Gains Power

February 25, 2014 10:59 am | by Massachusetts Institute of Technology | News | Comments

Since he was a graduate student, Armando Solar-Lezama, an associate professor in MIT's Department of Electrical Engineering and Computer Science, has been working on a programming language called Sketch, which allows programmers to simply omit some of the computational details of their code...

Using Stolen Computer Processing Cycles to Mine Bitcoin

February 25, 2014 10:50 am | by University of California - San Diego | News | Comments

A team of computer scientists at the University of California, San Diego, has taken an unprecedented, in-depth look at how malware operators use the computers they infect to mine Bitcoin, a virtual currency whose value is highly volatile. Researchers examined more than 2,000 pieces of malware...

LG to Offer its First Smartwatch this Year

February 24, 2014 2:21 pm | by Youkyung Lee, AP Technology Writer | News | Comments

LG Electronics Inc. said it will launch a computerized wristwatch later this year, entering a nascent market where Samsung Electronics Co., Sony Corp. and smaller companies such as Pebble are already jostling for dominance. Park Jong-seok, president of LG's mobile communications division...

HotSpot Episode 51: Cancer Glasses Make Cells Glow Blue

February 24, 2014 10:12 am | by Eric Sorensen, Coordinator of Multimedia Development | Videos | Comments

This week on WDD’s HotSpot: the Aura, electronic musical instrument; the CuffLinc from Cuff creates a protective circle; high-tech glasses that may help surgeons visualize cancer cells, which glow blue when viewed through the eyewear; and vehicle to vehicle communication from the Virginia Tech Transportation Institute...

Review: Picking Up Glass, Google Style

February 21, 2014 4:44 pm | by Barbara Ortutay, AP Technology Writer | News | Comments

The first time I was in the proximity of Google Glass was nearly a year ago at a technology conference. The people wearing the device were like cyborg members of an elite club I couldn't join. Now, it's my turn. I picked up my Glass on Jan. 24 at the Google Glass "base camp..."

Google Aims to Provide Broadband in 34 More Cities

February 19, 2014 3:06 pm | by Michael Liedtke, AP Technology Writer | News | Comments

Google is planning to offer high-speed Internet service in 34 more cities scattered across eight states in the company's boldest challenge yet to cable and telecommunications providers. The ambitious expansion announced Wednesday targets Arizona, California, Georgia, Tennessee, North Carolina, Oregon, Texas and Utah.

Using Holograms to Improve Electronic Devices

February 19, 2014 2:56 pm | by University of California - Riverside | News | Comments

A team of researchers from the University of California, Riverside Bourns College of Engineering and Russian Academy of Science have demonstrated a new type of holographic memory device that could provide unprecedented data storage capacity and data processing capabilities in electronic devices...

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading