Tag Archives | featured
Wearable Technology Can Help with Public Speaking

Wearable Technology Can Help with Public Speaking

Speaking in public is the top fear for many people. Now, researchers from the Human-Computer Interaction Group at the University of Rochester have developed an intelligent user interface for “smart glasses” that gives real-time feedback to the speaker on volume modulation and speaking rate, while being minimally distracting. The Rochester team describes the system, which [...]

Read full story Comments { 0 }
Under the Hood: Cloud and Data Center Orchestration and Management – Part 2

Under the Hood: Cloud and Data Center Orchestration and Management – Part 2

This is a continuation from Part 1. Computing environment specification with GUI Quali’s GUI is an entry point to Quali’s ClodShell orchestration platform, which is a powerful tool for specifying a development and testing environment. The GUI allows a user to draw his/her development and testing environment by selecting and placing icons. There are three [...]

Read full story Comments { 1 }
Under the Hood: Cloud and Data Center Orchestration and Management – Part 1

Under the Hood: Cloud and Data Center Orchestration and Management – Part 1

This blog continues a discussion of Quali Systems’ solutions for cloud and data center orchestration and management. This time I had a chance to talk with Hans Ashlock, technical marketing manager of Quali Systems. Hans Ashlock is pointing to a specified diagram to be created with Quali’s GUI. My objective with the visit was twofold: [...]

Read full story Comments { 0 }
Multiplying Mobile Devices’ Uploading Speed Tenfold

Multiplying Mobile Devices’ Uploading Speed Tenfold

A patent held by Universidad Carlos III de Madrid (UC3M) makes a jacket able to increase by tenfold the speed at which mobile devices can upload content. This is the MIMO HUB patent, which enables its jacket, in which numerous antennas are camouflaged, to connect to any mobile terminal in order to increase its data [...]

Read full story Comments { 0 }
Does Your Password Pass Muster? Password Strength Meters Not All Created Equal

Does Your Password Pass Muster? Password Strength Meters Not All Created Equal

“Create a password” is a prompt familiar to anyone who has tried to buy a book from Amazon or register for a Google account. Equally familiar is that red / yellow / green bar that rates the new password’s strength. But when those meters give the go-ahead to passwords like Password1+, their effectiveness is called [...]

Read full story Comments { 0 }
Mobile Battery Life can be Prolonged with System Settings

Mobile Battery Life can be Prolonged with System Settings

By using crowdsourced measurements researchers explain the energy impact of smartphone system settings, and their results show how to improve a mobile device’s battery lifetime by adjusting the settings. The NODES research group from University of Helsinki, Finland, has studied how the impact of different settings on battery lifetime can be estimated using crowdsourced measurements [...]

Read full story Comments { 0 }
Computer Programming: System Automatically Finds Common Type of Programming Bug

Computer Programming: System Automatically Finds Common Type of Programming Bug

Integer overflows are one of the most common bugs in computer programs — not only causing programs to crash but, even worse, potentially offering points of attack for malicious hackers. Computer scientists have devised a battery of techniques to identify them, but all have drawbacks. This month, at the Association for Computing Machinery’s International Conference [...]

Read full story Comments { 0 }
New Approach Uses ‘Twisted Light’ to Increase Efficiency of Quantum Cryptography Systems

New Approach Uses ‘Twisted Light’ to Increase Efficiency of Quantum Cryptography Systems

Researchers at the University of Rochester and their collaborators have developed a way to transfer 2.05 bits per photon by using “twisted light.” This remarkable achievement is possible because the researchers used the orbital angular momentum of the photons to encode information, rather than the more commonly used polarization of light. The new approach doubles [...]

Read full story Comments { 0 }
Mobile Quarantine Station for Malicious Android Apps

Mobile Quarantine Station for Malicious Android Apps

The attacks were perfidious: In February this year, the Czech IT security company Avast declared that it had identified several malicious game apps for mobile phones in the Google Play Store – ones that would only become criminally active on the device after several weeks. Then the affected smartphones or tablet computers would suddenly take [...]

Read full story Comments { 0 }
Nano Piano’s Lullaby Could Mean Storage Breakthrough

Nano Piano’s Lullaby Could Mean Storage Breakthrough

Researchers from the University of Illinois at Urbana-Champaign have demonstrated the first-ever recording of optically encoded audio onto a non-magnetic plasmonic nanostructure, opening the door to multiple uses in informational processing and archival storage.   “The chip’s dimensions are roughly equivalent to the thickness of human hair,” explained Kimani Toussaint, an associate professor of mechanical [...]

Read full story Comments { 0 }