Best in show: 6 gadgets that defined CES

(AP) -- Cheaper tablets, thinner laptops and an array of sleeker TVs stood out at this year's International Consumer Electronics Show in Las Vegas.

Can Clever Hackers Target Smart Phones?

(PhysOrg.com) -- Smart phones are becoming a common part of everyday life. Millions of Americans are using these powerful devices whose impressive capabilities and features rival that of desktop computers from just a few ...

Early look at Windows 8 baffles consumers (Update)

The release of Microsoft's Windows 8 operating system is a week away, and consumers are in for a shock. Windows, used in one form or another for a generation, is getting a completely different look that will force users to ...

Microsoft makes Word available on Android phones

Microsoft on Wednesday followed through on a promise to release versions of its widely used Word, Excel and PowerPoint programs for smartphones running on Google-backed Android software.

3D graphics, reality fuse on the fly

(PhysOrg.com) -- Software developed at Oxford University is making it possible to fuse real and 3D computer-generated visuals on the fly.

AOL offers video chat with no log-in, download

In a move to become more competitive in the fast-growing field of video chat, the team behind AOL Inc.'s AIM instant messenger rolled out the first version of a free video chat service on Thursday that doesn't require users ...

Researchers create cell phones for sign language

(PhysOrg.com) -- Cornell researchers and colleagues have created cell phones that allow deaf people to communicate in sign language, the same way hearing people use phones to talk.

Apple's got its eye on mobile games

In the eye of the typical beholder, Apple's iPhone is simply a popular device, great for fun, on-the-go applications-and phone calls.

Cellphones can steal data from 'air-gapped computers'

Researchers at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center have discovered that virtually any cellphone infected with a malicious code can use GSM phone frequencies to steal critical information ...

page 2 from 17