Tek-Tips | News RSS feed for this section
Multiplying Mobile Devices’ Uploading Speed Tenfold

Multiplying Mobile Devices’ Uploading Speed Tenfold

A patent held by Universidad Carlos III de Madrid (UC3M) makes a jacket able to increase by tenfold the speed at which mobile devices can upload content. This is the MIMO HUB patent, which enables its jacket, in which numerous antennas are camouflaged, to connect to any mobile terminal in order to increase its data [...]

Read full story Comments { 0 }
Does Your Password Pass Muster? Password Strength Meters Not All Created Equal

Does Your Password Pass Muster? Password Strength Meters Not All Created Equal

“Create a password” is a prompt familiar to anyone who has tried to buy a book from Amazon or register for a Google account. Equally familiar is that red / yellow / green bar that rates the new password’s strength. But when those meters give the go-ahead to passwords like Password1+, their effectiveness is called [...]

Read full story Comments { 0 }
Mobile Battery Life can be Prolonged with System Settings

Mobile Battery Life can be Prolonged with System Settings

By using crowdsourced measurements researchers explain the energy impact of smartphone system settings, and their results show how to improve a mobile device’s battery lifetime by adjusting the settings. The NODES research group from University of Helsinki, Finland, has studied how the impact of different settings on battery lifetime can be estimated using crowdsourced measurements [...]

Read full story Comments { 0 }
Computer Programming: System Automatically Finds Common Type of Programming Bug

Computer Programming: System Automatically Finds Common Type of Programming Bug

Integer overflows are one of the most common bugs in computer programs — not only causing programs to crash but, even worse, potentially offering points of attack for malicious hackers. Computer scientists have devised a battery of techniques to identify them, but all have drawbacks. This month, at the Association for Computing Machinery’s International Conference [...]

Read full story Comments { 0 }
New Approach Uses ‘Twisted Light’ to Increase Efficiency of Quantum Cryptography Systems

New Approach Uses ‘Twisted Light’ to Increase Efficiency of Quantum Cryptography Systems

Researchers at the University of Rochester and their collaborators have developed a way to transfer 2.05 bits per photon by using “twisted light.” This remarkable achievement is possible because the researchers used the orbital angular momentum of the photons to encode information, rather than the more commonly used polarization of light. The new approach doubles [...]

Read full story Comments { 0 }

Intelligent Computers Solving the Trust Equation in Difficult Negotiations

Socially intelligent computers can turn difficult online negotiations into win−win situations through tactical information disclosure Programming fundamental ‘social intelligence’ skills into software agents can make humans substantially more trusting of online negotiations, which can lead to superior outcomes in e-commerce transactions, finds an A*STAR-led team of technology researchers, business experts and cognitive scientists. Automated software [...]

Read full story Comments { 0 }

Quantum Computing: One Step Closer with Defect-Free Logic Gate

What does hair styling have in common with quantum computing? The braiding pattern has inspired scientists as a potential new approach to quantum calculation. The idea is to rely on a network of intersecting chains, or nanowires, containing two-dimensional quasi-particles. The way these quasi-particles evolve in space time produces a braid-like pattern. These braids could [...]

Read full story Comments { 0 }
New UI for K-Glass 2 that Works with Eye Blinking

New UI for K-Glass 2 that Works with Eye Blinking

A newly developed user interface, the “i-Mouse,” in the K-Glass 2 tracks the user’s gaze and connects the device to the Internet through blinking eyes such as winks. This low-power interface provides smart glasses with an excellent user experience, with a long-lasting battery and augmented reality. Smart glasses are wearable computers that will likely lead [...]

Read full story Comments { 0 }
Mobile Quarantine Station for Malicious Android Apps

Mobile Quarantine Station for Malicious Android Apps

The attacks were perfidious: In February this year, the Czech IT security company Avast declared that it had identified several malicious game apps for mobile phones in the Google Play Store – ones that would only become criminally active on the device after several weeks. Then the affected smartphones or tablet computers would suddenly take [...]

Read full story Comments { 0 }
Nano Piano’s Lullaby Could Mean Storage Breakthrough

Nano Piano’s Lullaby Could Mean Storage Breakthrough

Researchers from the University of Illinois at Urbana-Champaign have demonstrated the first-ever recording of optically encoded audio onto a non-magnetic plasmonic nanostructure, opening the door to multiple uses in informational processing and archival storage.   “The chip’s dimensions are roughly equivalent to the thickness of human hair,” explained Kimani Toussaint, an associate professor of mechanical [...]

Read full story Comments { 0 }