Innovative technology addresses wireless interference

Imagine a room with several people in it, all talking at the same time. With everyone competing to speak, it's hard to hear any one person clearly. Wireless networks, being a shared medium, struggle with a similar problem ...

Cross-arms could speed up connection of new electricity supplies

(Phys.org)—A revolutionary device developed by engineers at The University of Manchester and EPL Composite Solutions Ltd. could dramatically increase the capacity of the UK's electricity network, enabling rapid increases ...

Thermogenerator from the printer

Wireless sensor networks monitor machinery and equipment in factories, cars and power stations. They increasingly "harvest" the energy they need to transmit measurement data from the environment, thus making them self-sufficient. ...

Senate may go on break without passing cyber bill

The U.S. Senate could leave town this week for a monthlong break without passing legislation to protect the country's electrical grid, water supplies and other critical industries from cyberattack and electronic espionage.

US cybersecurity efforts trigger privacy concerns

(AP) -- The federal government's plan to expand computer security protections into critical parts of private industry is raising concerns that the move will threaten Americans' civil liberties.

Giving the electricity network more grunt

A new Queensland University of Technology (QUT) research project aims to overcome one of Australia's main hurdles to the increased use of wind and solar energy.

Flaw makes Jawbone UP wristbands go down

US wireless earpiece maker Jawbone on Thursday apologized for a flaw that causes its fitness focused UP wristbands to go down and offered users their money back even if they keep the gadgets.

Pentagon to publish strategy for cyberspace wars

(AP) -- Facing escalating risks of cyberattacks by hackers, criminals and other nations, the Pentagon is developing more resilient computer networks so the military can continue to operate if critical systems are breached ...

page 10 from 15