Emerging Tech


PRESENTED BY: Adobe

Emerging Tech

  • Can Bluetooth power the IoT mesh network?

    Can Bluetooth power the IoT mesh network?

    With its market penetration and low power requirements, Bluetooth Smart is positioned to network the Internet of Things.

  • Lenovo

    Lenovo's AnyPen eliminates the need for a stylus

    The AnyPen technology lets users write with a ballpoint pen or graphite pencil, delivering more precise navigation than a finger and eliminating the need for a proprietary stylus.

  • IoT conundrum: How to power buried sensors

    A researcher at Michigan State University has developed technology that can generate electrical power to buried or implanted sensors.

  • Using smartphones for ID authentication

    Using smartphones for ID authentication

    The technology built into most smartphones can provide more sophisticated authentication than a paper drivers’ license or passport.

    Comments: 1
  • DARPA makes strides in searching the ‘deep web’

    DARPA makes strides in searching the ‘deep web’

    The Defense Department’s research arm has developed a search engine that lets investigators find and analyze data in the ‘deep web,’ a swath of the Internet inaccessible with conventional tools.

  • Pushing cell service to remote areas, disaster zones

    Pushing cell service to remote areas, disaster zones

    Endaga's CCN1 low-power, open source cellular network provides voice and data service to standard mobile phones.

  • Sensors on a combine enable precision agriculture

    Sowing the Internet of Things into agriculture

    The National Agricultural Statistics Service wants to use the Internet of Things to glean data from sensors on farm machinery in an effort to boost precision agriculture.

  • Veniam’s networking service collects data from sensors and delivers Wi-Fi connectivity

    A network for the Internet of (moving) Things

    Veniam’s networking service not only collects data from sensors – whether stationary or deployed on fleets of vehicles – but also delivers Wi-Fi connectivity to those within range of the vehicles.

  • Apps, not malware, should be your biggest MDM concern

    Apps, not malware, should be your biggest mobile concern

    A two-pronged approach to mobile security focuses on enforcing security from the center while showing users the security risks at the endpoints of their mobile devices.

    Comments: 1
  • Are agency researchers being misled by Twitter data?

    Are agency researchers being misled by Twitter data?

    The use of social media as a public outreach and data collection tool is now actively promoted by government agencies. But do the data samples paint an accurate representation of public sentiment?