Euclid Zero debuts to capture in-store shopper behavior
New algorithm for message dissemination in decentralized networks faster than its predecessors and guarantees delivery
Ad hoc networks—communication networks set up on the fly by mobile sensors—pose problems that ordinary office networks don't. Ad hoc networks are usually decentralized, meaning that no one node knows ...
UK telecoms regulator studies possibility of 5G
Jamming LTE base stations easier than you may think
Android apps are full of potential leaks, finds study
Google launches its own mobile telephone service
Google said Wednesday it was launching its own US mobile wireless service, with considerable potential savings for customers using their devices at home and for international travel.
Bandwidth-borrowing handsets are in the wings
How WWI codebreakers taught your gas meter to snitch on you
In the depths of night on August 5th 1914 the British Cable Ship Alert took the first significant action of World War I, severing the five German submarine cables that ran through the English Channel. This ...
LinkedIn membership hits 300 million
The career-focused social network LinkedIn announced Friday it has 300 million members, with more than half the total outside the United States.
Facebook smartphone chats pushed to Messenger app
Facebook has begun pushing smartphone chats between friends to a stand-alone Messenger application.
Don't let personal data escape your smartphone
(Phys.org) —Two EPFL researchers have developed an application that automatically secures shared information on a mobile phone. The Android app should be available in late summer 2014.
Zuckerberg sells as Facebook offers new shares (Update 2)
Facebook chief Mark Zuckerberg will sell a chunk of his stake in the company, cashing in some $2.3 billion, as part of a new share offering by the huge social network.
Facebook testing video advertisements (Update 2)
Investors are giving a thumbs-up to the idea of Facebook making hundreds of millions in new revenue from video advertisements, but some users argue that the social network is already too cluttered and has become more about ...
Iowa State engineers use keyboard, mouse and mobile device 'fingerprints' to protect data
We've all typed in a password to access a computer network. But how secure is that? Passwords can be hacked or hijacked to get at sensitive personal, corporate or even national security data.