Since the dawn of time, man has tried to record important events and techniques for everyday life. At first, it was sufficient to paint on the family cave wall how one hunted. Then came the people who...
The “Nokia Morph†is a theoretical future device based on nanotechnology that might enable future communication devices. It is intended to demonstrate the flexibility of future mobile devices, in...
Cloud computing is offering utility oriented IT services to users worldwide. It enables hosting of applications from consumer, scientific and business domains. However data centers hosting cloud compu...
Devices that use light to store and read data have been the backbone of data storage for nearly two decades. Compact discs revolutionized data storage in the early 1980s, allowing multi-megabytes of d...
An individual first rests his wrist, and on some devices, the middle of his fingers, on the sensor's supports such that the palm is held centimeters above the device's scanner, which flashes a near-i...
Laptops are becoming as common as your cellular phone, and now they share the hardware industry as that of desktop computers with a number of configurable options. The features, the price, the build q...
RAIN technology is the most scalable software cluster technology for the Internet marketplace today. There is no limit on the size or the performance of a RAIN cluster. Within a RAIN cluster, there is...
Today IP Telephony is a very powerful and economical communication options. IP telephony is the integration and convergence of voice and data networks, services, and applications.
Today's vehicles contain hundreds of circuits, sensors, and many other electrical components. Communication is needed among the many circuits and functions of the vehicle. For example, when the driver...
An IPTV signal is a stream of data packets traveling across the Web.Internet TV is relatively new -- there are lots of different ways to get it, and quality, conten...
Game playing was one of the first tasks undertaken in Artificial Intelligence. Game theory has its history from 1950, almost from the days when computers became programmable. The very first game that...
We introduce CAPTCHA, an automated test that humans can pass, but current computer programs can't pass: any program that has high success over a captcha can be used to solve an unsolved Artifcial Inte...
Brain fingerprinting is based on finding that the brain generates a unique brain wave pattern when a person encounters a familiar stimulus Use of functional magnetic resonance imaging in lie detection...
Electronic payment systems come in many forms including digital checks, debit cards, credit cards, and stored value cards. The usual security features for such systems are privacy (protection from eav...
Electronics without silicon is unbelievable, but it will come true with the evolution of Diamond or Carbon chip. Now a day we are using silicon for the manufacturing of Electronic Chip’s. It has man...
Computer Viruses are widely known as evil programs that are meant to corrupt the peaceful environment of a computer. Actually a computer virus is a piece of programming code that alters the way your c...
Cyberterrorism is any act of terrorism that uses information systems or digital technology (computers or computer networks) as either an instrument or a target. Cyberterrorism can either be "internati...
Free Space Optics (FSO) or Optical Wireless, refers to the transmission of modulated visible or infrared (IR) beams through the air to obtain optical communications. Like fiber, Free Space Optics (FSO...