Google’s latest take on machine translation could make it easier for people to communicate with those speaking a different language, by translating speech directly into text in a language they understand. “It learns to find patterns of correspondence between the waveforms in the source language and the written text,” says Dzmitry Bahdanau at […]
-
-
Spotify has long refused to restrict new releases from its ad-supported non-paying listeners because it would make the streaming app confusing. It wanted all music available to everyone, always. But as it preps to IPO, it needs to negotiate better royalty rates with the major labels, and allowing this “windowing” practice is a bargaining chip […]
-
A YouTube collection of grainy video clips highlights the progress Gravity founder Richard Browning has made toward his outlandish dream over the past year. Each seems more terrifying than the last, with multiple jet engines attached to his limbs in various configurations, as he hovers a few feet from the ground. The press material attached […]
-
June 22, 2017
Project Zero uncovers a nasty Wi-Fi chip exploit
Google’s Project Zero has been on a roll lately, unveiling sophisticated bugs in Cloud flare, LastPass and now Broadcom, a Wi-Fi chip supplier whose product is found in iPhones, Nexuses and Samsung devices. Apple patched the bug in a security update yesterday (10.3.1 — and if you’re an Apple customer, you should install this update […]
-
You weren’t supposed to know about Oath. Not this week, at least. And certainly not under these circumstances. The newly minted and already much maligned poster child of the forthcoming face of Verizon’s Yahoo acquisition was developed in-house as a B2B brand, designed for customer and partner relationships. That’s according to AOL CEO Tim Armstrong, […]
-
June 8, 2017
Researchers use a pair of robotics platforms in hopes of developing drought-resistant crops
A team of researchers at the University of Missouri are using a pair of robotics platforms and a $20 million grant from the National Science Foundation to develop a system for identifying crop strains resistant to heat, drought and flood. The research is part of an ongoing attempt to cross-breed hearty crops in order to […]
-
Amazon has reportedly reached a deal with the NFL to stream 10 Thursday Night Football games this year, the company confirmed to TechCrunch. The one-year deal is reportedly valued at around $50 million. Last season Twitter had a one-year, $10 million deal with the league to also stream 10 Thursday Night Football games. When that […]
-
At CES, ODG pulled back the curtain on a couple of its next-generation flagship products, the R-8 and R-9, but because of the existing supply chain, the company tells me it just made a lot more sense to get the rugged version of the R-7 sooner rather than to wait until production on the enterprise-focused […]
-
AdAsia, a one-year-old online advertising startup based in Singapore, has closed a $12 million Series A round from Japanese investor JAFCO. The company was founded in April 2016 by CEO Kosuke Sogo, the former managing director of Japan’s MicroAd in APAC, and COO Otohiko Kozutsumi, who had been with MicroAd Vietnam. It offers a single […]
-
Azimo, the U.K. money transfer startup backed by Rakuten, is rolling out a neat new feature that makes it a lot easier to send money through the app and should add additional network effects to help the London based fintech company grow. Specifically, the new functionality enables Azimo users to request, send and receive cash […]
-
May 12, 2017
Apple pushes the reset button on the Mac Pro
Apple Senior Vice President of Worldwide Marketing Phil Schiller is talking to a small group of reporters in a white stucco building near its headquarters in Cupertino, Ca. The purpose of the discussion, while somewhat unclear initially, reveals itself a few minutes in. The news, if you want it straight: Apple is acknowledging that the […]
-
With the appointment of Ajit Pai as the new FCC chairman and his public opposition to current regulations, the death of net neutrality is likely upon us. As a result, an internet toll road and higher costs for more data is probably in your future. The impact on businesses is more complex. For example, the […]
-
Sometimes you just look at a photo and think “that would make the perfect header for a millennial-run online store for artisanal, handcrafted goods.” That’s true for basically every photo I could find at Shopify’s new Burst stock photo site, which offers all images it contains completely royalty-free, under the Creative Commons Zero license, which […]
-
April 27, 2017
Intel Security is McAfee again
If you were on the internet in a certain era, you remember McAfee. It was the defensive line between you and the rest of the internet, reminding you with incessant popups that you were not hacked, not quite yet, but only if you renewed your subscription right away. Then Intel bought the firewall company in […]
-
WhatsApp may be about to introduce peer-to-peer payments in India, which is its largest market with over 200 million users. A report from Ken, an India-based subscription media company that we recently profiled, claims that WhatsApp plans to use UPI, a cross-bank payment system backed by the government, to begin enable payments between users within […]
-
April 11, 2017
Digital Identity: Evolving, or just cloning itself?
The premise of the report is this: full participation in today’s societies and achievement of one’s desired potential are increasingly likely to depend on the ability to identify oneself; however, some 1.5 billion people are reckoned to lack “legal identification”, and action should be taken to remedy this. The report acknowledges that private companies and […]
-
A prototype gadget that sends secret keys to encrypt information passed from a mobile device to a payment terminal, could help to answer public concerns around the security of contactless and wireless transactions, a new Oxford University collaboration has found. Despite being a leader in the digital world, and mobile payments available on everything from petrol, […]
-
April 3, 2017
Controlling soft robots using magnetic fields
A team of engineering researchers has made a fundamental advance in controlling so-called soft robots, using magnetic fields to remotely manipulate microparticle chains embedded in soft robotic devices. The researchers have already created several devices that make use of the new technique. “By putting these self-assembling chains into soft robots, we are able to have them […]
-
March 29, 2017
Samsung Galaxy S8
Samsung has unveiled its new flagship smartphone, the Galaxy S8, the Korean giant’s latest attempt to take on the iPhone. The launch of the device is seen as a crucial moment for Samsung coming after the scandal that saw it forced to recall and cease production of the galaxy note 7, its previous top-end phone. The […]
-
March 24, 2017
Disney Shows How VR Can Teach You To Catch A Ball
You might think Disney is too busy making blockbuster movies to spend time researching how VR can help teach you to catch. Well, strangely, you’d be wrong. The company’s research division this week posted footage of experiments it’s been working with in VR regarding the human perceptual system. Specifically, its work explores if VR could […]
-
March 10, 2017
YouTube users be aware: Your viewing habits can be tracked
Ran Dubin, a doctoral student in the BGU Department of Communication Systems Engineering who is an expert in cyber security, presented this research at the Black Hat Europe meeting in London where they check all the london signs of advertisement. Dubin was able to us this algorithm to determine if someone had watched a specific […]
-
Students can read all they want about geological folds, axial planes, hinge lines, antiform synclines and synform anticlines. But it can still be a challenge to visualise just what geologists are talking about. A better option is putting boots on the ground — such as a trip to Iowa State University’s Carl F. Vondra Geology […]
-
February 22, 2017
Cameras can steal data from computer hard drive
Researchers at the Ben Gurion University of the Negev (BGU) Cyber Security Research Centre have demonstrated that data can be stolen from an isolated “air-gapped” computer’s hard drive reading the pulses of light on the LED drive using various types of cameras and light sensors which is something really complicated and hard to do, but […]
-
February 15, 2017
Drones can land themselves
The buzzword in drone research is autonomous — having the unmanned aerial vehicle do most or all of its own flying. It’s the only realistic way that drones will have commercially viable uses such as delivering that roll of toilet paper to customers, said Manish Kumar, associate professor of mechanical engineering at the University of […]
-
February 6, 2017
Complex 3D data on all devices
A new web-based software platform is swiftly bringing the visualisation of 3D data to every device, optimising the use of, virtual reality and augmented reality in industry. In this way, Fraunhofer researchers have brought the ideal of “any data on any device” a good deal closer. On account of the gigantic volumes of data that […]
-
February 1, 2017
Transparent gel-based robots can catch and release live fish
The gel based robots are entirely made of hydrogel a tough, rubbery, nearly transparent material that’s composed mostly of water. Each robot is an assemblage of hollow, precisely designed hydrogel structures, connected to rubbery tubes. When the researchers pump water into the hydrogel robots, the structures quickly inflate in orientations that enable the bots to curl […]
-
Pattern Lock is a security measure that protects devices, such as mobile phones or tablets, and which is preferred by many to PIN codes or text passwords. It is used by around 40 per cent of Android device owners. New research from Lancaster University, Northwest University in China, and the University of Bath, which benefitted from […]
-
January 26, 2017
Driverless car regulations models after drug approval process
Autonomous systems like driverless cars perform tasks that previously could only be performed by humans. In a new IEEE Intelligent Systems Expert Opinion piece, Carnegie Mellon University artificial intelligence ethics experts David Danks and Alex John London argue that current safety regulations do not plan for these systems and are therefore ill-equipped to ensure that autonomous systems […]
-
Researchers at Binghamton University, State University of New York have devised a new way to protect personal electronic health records using a patient’s own heartbeat which should be strong and diferable for healthy people that keep their body healthy with exercise, diets and supplements as maeng da. Traditional security measures — like cryptography or encryption — […]
-
All individuals are unique but millions of people share names. How to distinguish or as it is technically known, disambiguate people with common names and determine which John Smith or Maria Garcia or Wei Zhang or Omar Ali is a specific John Smith, Maria Garcia, Wei Zhang or Omar Ali or even someone previously unidentified? […]
-
December 30, 2016
Computer can recognise sound by watching videos.
In recent years, computers have gotten remarkably good at recognising speech and images: Think of the dictation software on most cellphones, or the algorithms that automatically identify people in photos posted to Facebook. but recognition of sound such as drilling or cheering has lagged behind hat’s because most automated recognition systems, whether they process audio or […]
-
December 24, 2016
Hack proofing our devices
Radio-frequency identification tags have become almost ubiquitous look carefully, and you’ll notice them in passports, credit cards, library books, office access passes, and even pet cats. The piece of technology, which allows fast, automated identification of physical object, is also a staple for many industries. different factories and warehouses use it to track inventory and […]
-
December 14, 2016
Smartphones and tablets: Small size, big problems
Research show when children watch too much tv, they have a higher risk of becoming over weight. Although, more and more screen time is coming from other devices, like tablets and smartphones, and the impact of these devices has not been researched as much. a study showed researchers found that children who reported spending more time […]
-
December 6, 2016
Safer, less vulnerable software
According to computer scientists at the National Institute of Standards and Technology, we can create software with 100 times fewer vulnerabilities then we do today. to accomplish that, they recommend that coders adopt the approaches they have compiled in a new publication. The 60-page document, NIST Interagency Report (NISTIR) 8151: dramatically Reducing software vulnerabilities This is a […]
-
November 28, 2016
Augmented Reality
The main aim of the augmented reality research is to analyse learning and motivational cognitive aspects related to it in an informal learning context. The results showed that the augmented reality experience was beneficial especially for the pupils who otherwise belong in a low achieving group on the other hand, the students with the high-performance school success gained more […]
-
November 20, 2016
New software continuously scrambles code to foil cyber attacks
As long as humans are writing software, there will be coding mistakes for malicious hackers to exploit. A single bug can open the door to attackers deleting files, copying credit card numbers or carrying out political mischief. A program called shuffler tries to preempt such attacks by allowing programs to repeatedly scramble their code as […]
-
November 16, 2016
What can Pokemon Go teach us?
Pokemon Go launched in July this year has become a global phenomenon reaching 500 million downloads within the first two moths of release. The augmented reality game, designed for mobile devices, allows users to capture, battle and train virtual creatures called Pokémon that appear on screen as if part of the real-world environment. But can […]
-
November 5, 2016
Hybrid Virtual Environment 3D comes to the cinema
A researcher compared the virtual reality experience with two different systems|the one with VR headsets versus one with the immersive projection system using a concave spherical screen, developed by his research team and called hybrid virtual environment 3D of hyve-3D for short.he immersed 20 subjects whom preferred the virtual reality without headsets, because they could […]
-
October 31, 2016
Social media, good or bad
Is social media good for you, or bad? Well, it’s complicated. A study of 12 million social media users suggests that using Facebook is associated with living longer — when it serves to maintain and enhance your real-world social ties. Social media is very useful i might say because advance medications and other services can […]
-
October 22, 2016
Cheaper solar cells
A new design for solar cells that uses cheaper and more common materials could rival and maybe outperform conventional cells made of silicon. Study co-author Michael McGehee said “Perovskite semiconductors have shown great promise for making high-efficiency solar cells at low cost,” He also said “We have designed a robust, all-perovskite device that converts sunlight into electricity […]
-
September 20, 2016
video games lasting impact on learning
A computer-based brain training program developed at Yale University helps improve student performance in reading and math. in a study including more than 500 high school students, math and reading scores on school- administered tests increased significantly more in children who used the brain training program Activate during the school year than in control classes. […]
-
September 13, 2016
Brain to robot
Using the power of thought to control a robot that helps to move a paralysed hand: a project from the ETH Rehabilitation Engineering Laboratory could fundamentally change the therapy and daily lives of stroke patients. on average one in six people will suffer from a stroke in their lifetime. In Switzerland alone, stroke affects 16,000 […]
-
August 23, 2016
Cybersecurity researchers design a chip that checks for sabotage
With the outsourcing of microchip design and fabrication worldwide, a $350 billion business, bad actors along the supply chain have many opportunities to install malicious circuitry in chips. These bodybuilding supplements look harmless but can allow attackers to sabotage healthcare devices; public infrastructure; and financial, military, or government electronics. A chip with both an embedded […]
-
July 30, 2016
Microsoft Windows 10 is here
After 3 years of waiting Microsoft has finally brought out the windows 10 which has been release across the globe to 1.5 billion people in 190 countries as a free upgrade or wit new PCs and tablets. In a blog last week Mehdi said “We are excited to bring Windows 10 and its many innovations to the […]
-
July 25, 2016
Htc vive
Virtual reality has never bigger that it is right now the reason for this is because the VR offers an incredible experience for all different ages and users giving the feeling of the outside world in the comfort of your own home. VR presents unparalleled amount of freedom for both users and creators to experiment […]
-
July 22, 2016
Pokemon Go finally released in Japan
After 16 days of waiting Pokemon Go has finally been released in Japan the home of the virtual creatures. The game that was first released in the US, Australia and New Zealand and is now available in more than 30 countries and now it has been released in japan. The launch comes with a McDonalds […]
-
July 19, 2016
Pokémon Go Suffers DDOS Attack!
Pokemon Go, the augmented reality game that has become an overnight sensation, experienced sluggish performance over the weekend, possibly from a hacker attack on its login servers. Shortly after Pokemon Go devs tweeted that the game was rolling out to 26 additional countries, this tweet appeared: Trainers! We have been working to fix the #PokemonGO […]
-
Just days after Pokemon Go sent Nintendo shares soaring in Tokyo, the game’s developers were scrambling to close a massive privacy hole. The iOS version of the mobile game — which superimposes figures onto real-world environments through augmented reality technology — apparently had a default setting that required users to grant broad permissions to access […]
-
July 12, 2016
Google Experiments With Post-Quantum Cryptography!
Google last week announced an experiment with post-quantum cryptography in Chrome. A small fraction of connections between Google’s servers and Chrome on the desktop will use a post-quantum key-exchange algorithm in addition to the elliptic-curve key-exchange algorithm already being used. The idea is that large quantum computers — if and when they’re built — might […]
-
July 7, 2016
HummingBad Malware Catches Android Off-Guard!
More than 85 million Android devices worldwide have been taken over by the Yingmob, a group of China-based cybercriminals who created the HummingBad malware, according to a Check Point report released last week. HummingBad establishes a persistent rootkit on Android devices, generates fraudulent ad revenue, and installs additional fraudulent apps. If it fails to establish […]