A team at the University of California, Riverside Bourns College of Engineering has developed a novel way to build what many see as the next generation memory storage devices for portable electronic devices including smart phones, tablets, laptops, and digital cameras.
Antivirus software running on your computer has one big weak point - if a new virus is released before the antivirus provider knows about it or before the next scheduled antivirus software update, your system can be infected. Such zero-day infections are common.
Information theory — the discipline that gave us digital communication and data compression — also put cryptography on a secure mathematical foundation. Since 1948, when the paper that created information theory first appeared, most information-theoretic analyses of secure schemes have depended on a common assumption.
ETH-researchers cannot "beam" objects or humans of flesh and blood through space yet, a feat sometimes alluded to in science fiction movies. They managed, however, to teleport information from A to B – for the first time in an electronic circuit, similar to a computer chip.
Memory devices like disk drives, flash drives, and RAM play an important role in our lives. They are an essential component of our computers, phones, electronic appliances, and cars. Yet current memory devices have significant drawbacks: dynamic RAM memory has to be refreshed periodically, static RAM data is lost when the power is off, and flash memory lacks speed.
Apple's shares srged passed the $500 threshold — their highest level since January. Wednesday's gains came a day after activist investor Carl Icahn said he thinks the iPhone maker should do more to revive its stock price. The outspoken billionaire said in Twitter posts Tuesday that he had acquired an unspecified stake in Apple and had spoken to its CEO about boosting share repurchase plans.
Microsoft said it has fixed a problem that prevented some people from getting their email on Outlook.com, but mobile users might still be having problems.Service had been restored on the Web shortly after 2 p.m. PDT Wednesday, according to an update on Microsoft's website.
IBM is buying fraud protection software maker Trusteer, amid the growing threat of cyberattacks. The Armonk, NY, technology services company announced the acquisition Thursday, but didn't disclose how much it paid for Trusteer. In connection with the deal, IBM said it's forming a new software lab in Israel where Trusteer and IBM researchers and developers will work together on cybersecurity issues.
A group of smartphone app developers and weather experts discovered a way to use the temperature sensors built into smartphone batteries to crowdsource weather information. These tiny thermometers usually prevent smartphones from dangerously overheating, but the researchers discovered the battery temperatures tell a story about the environment around them.
Rachel has over 15 years in the mobile industry, with experience working for companies ranging in size from startups to multinational corporations. She was recently the vice president for product management at DeviceAnywhere, before it was acquired by Keynote. Rachel has also managed the wireless data quality products at Telephia, which is now part of Nielsen.
Peregrine Semiconductor Corporation has announced they have teamed up to develop the high-performance antenna tuning design solution in the LG Optimus G Pro smartphone that was recently introduced to the Korean market. The Optimus G Pro features a 5.5-inch full High Definition (HD) In-Plane Switching (IPS) display...
TriQuint Semiconductor has announced that it has acquired CAP Wireless and its patented Spatium RF power combining technology that replaces traveling wave tube amplifiers (TWTAs) in communications and defense systems. TriQuint estimates that the TWTA market opportunity will be about $600 million by 2015.
MEN Micro has recently achieved two notable certifications related to its product development and manufacturing quality. The company successfully obtained renewal of its IRIS certification on the first audit as well as implemented the EFQM Excellence Model to ensure the continued quality management of its embedded products and services worldwide.
IBM has announced that Gartner has positioned IBM as a Leader in the Magic Quadrant for Mobile Application Development Platforms. The new report places IBM in the Leaders Quadrant, as measured by completeness of vision and execution ability of IBM Worklight, IBM’s mobile application development platform.
GE recently won three prestigious audiovisual (AV) awards for its advanced technology at the company’s Grid IQ Global Innovation Center in Markham, Ontario. At the centerpiece of the center is a 60-foot-wide, seven-foot-high, 180-degree curved laser phosphor display videowall, designed by Prysm...
The Solutions for Testing NFC Devices application note explains how to use an accurate, configurable and versatile test bench with qualified test tools to address test challenges throughout the NFC product development cycle. It is the newest in the series of Agilent Power of X application notes created to provide insight...
University of Washington engineers have created a new wireless communication system that allows devices to interact with each other without relying on batteries or wires for power. The new communication technique, which the researchers call “ambient backscatter,” takes advantage of the TV and cellular transmissions that already surround us around the clock.
The Renew ad firm has been using technology embedded in the hulking receptacles to measure the Wi-Fi signals emitted by smartphones, and suggested that it would apply the concept of "cookies" — tracking files that follow Internet users across the Web — to the physical world.
BlackBerry shares surged Tuesday on a report that its largest shareholder is looking to take the company private and on speculation about how much the company could fetch. The struggling smartphone maker said Monday it will consider selling itself. The long-awaited debut of its new phones this year has failed to turn around the struggling smartphone maker.
Icahn, an outspoken billionaire renowned for pouncing on out-of-favor stocks, signaled he has Apple in his sights in two short messages posted Tuesday on his Twitter account. Until now, he had been deploying Twitter as a weapon in his attack on Dell's proposed sale to a group led by its CEO, Michael Dell.
Body-worn cameras are being used in hundreds of smaller departments around the country and have been largely successful in reducing complaints against police and controlling the behavior of some suspects. But New York City's mayor has criticized their use as unnecessary for the 35,000-officer department. Police reform advocates cautiously agreed to the idea in theory — with some caveats.
Researchers with the U.S. Department of Energy (DOE)’s Lawrence Berkeley National Laboratory (Berkeley Lab) have discovered a unique new twist to the story of graphene, sheets of pure carbon just one atom thick, and in the process appear to have solved a mystery that has held back device development.
Americans are becoming increasingly concerned about government invasion of privacy while investigating terrorism, and some ordinary citizens are finding ways to push back. They are signing online petitions and threatening lawsuits. Some are pressing their providers to be upfront when data is shared with the government, which federal law allows as long as the person isn't being investigated under an active court order.
New York is trying to corral the "Wild West" atmosphere of virtual currencies such as Bitcoin and may create new regulations to keep the growing technology from being used in crimes. Financial Services Superintendent Benjamin Lawsky's inquiry is confirmed in a memo provided to The Associated Press on Monday.
Thai police asked the operator of the popular "Line" instant messaging app for access to records of online chats, raising concerns about intrusive surveillance despite promising only suspected criminals would be targeted. Technology Crime Suppression division chief Pisit Paoin said Tuesday that police want to review the data of users they suspect are involved in crimes.