Home » Technology » Articoli recenti:

From lithium to sugar: unveiled the future of batteries

ottobre 30, 2012 Technology 5 Commenti

The study is gripping scientists from different years, replace the lithium batteries present in smartphones, laptops, tablets, and numerous electronic devices with sugar batteries. Just like that, it seems that the exposure to very high temperatures generates sugar anodes capable of storing energy for batteries. This would have the 20% more than electric storage capacity of the lithium ion. So there would be more duration and considerably lower costs. In addition, the lithium is a non-renewable mineral presents on Earth in very scarce quantity and therefore destined to finish in time. The lack of presence makes it expensive even though it’s harmful to both humans and the environment.

Together with the sugar, sodium may also be a viable alternative at a cost of advantage. To this is added the unlimited availability of the mineral.

In reality, the story of the sugar batteries is a kind of laboratory curiosity that, in recent years, it has enjoyed some fleeting moment of glory. Other hand never before have been achieved so promising results as those obtained by the Japanese giant, Sony, given that the prototypes of this kind previously made were able to produce an amount of energy too small to find a practical use.

If this is true, in a short everyday electronic devices could be powered by batteries economic and completely biodegradable and with environmental impact extremely content.

The researchers think to immetter this technology on the market within 5 years. In a perspective of technological innovation, which in recent times has seen the implementation in everyday life of advanced systems such as biometric access control or GPS tracking systems, batteries sugar could remedy to the increasingly frequent alarms of gradual exhaustion of fossil fuels and add an important element to the incessant search for alternative sources and renewable energy.

The electronics could be biodegradable?

ottobre 25, 2012 Biotechnology, Technology 1 Commento

There is who thinks to save data for millions of years, who instead want to get rid of them as soon as possible.

To be precise, they’re hi-tech components very durable and completely biodegradable. The research conducted by the American University of Illinois and published in “Science” aims to solve the problem of disposing of electronic devices. The raw material of the project is the silk. This ancient material, completely revised in a technological key and made very strong, would be to cover the traditional electronics devices, however, composed of silicon and magnesium. The researchers would be able to precisely control the structure of the casing of silk that covers them so calculating the expiration date of the components.

This new mix also promises great performance, preserving the environment. The advantages of “transient electronics”, so named by the researchers, would be many, in addition to the disposal of many components, we can think to the mobile phones, it could have important applications in the biomedical field, would be feasible for example prosthesis perfectly absorbed by the body without having to be surgically removed. The life may vary from a few minutes to several years and they simply dissolve in water or organic liquids.

In the market there are already “hard drive destoyer” such as the secure deletion of data on electronic devices. HD-Eraser for example, is a device that uses the technique of demagnetization to ensure the protection of privacy with regard to private, public or financial institutions. Once this is done, it would be best to dispose of the equipment.

Thinking about the environment and the huge amount of electronic waste abandoned in landfills for years, the benefits that electronic biodegradable could make would be very important: products may dissolve themselves with no damage, once they have completed their work.

Samsung patents a “Life Diary”

ottobre 17, 2012 Technology No Commenti

Songs, images, video, texts, movements and everything of personal that can be on our smartphone, captured and shown in a diary self-writing.

It’s that the idea behind the patent filed by the Korean giant, Samsung and for which it’s already working. A new app in short, evolution and integration of other existing software, able to recreate in virtual form our day. A kind of personnel black box, that implemented to the operating systems for smartphones or tablets, will draw up a detailed report of the activities carried out by a person and of the time dedicated to each of them.

As if we were surrounded by a large number of bugs, the system could make known what we are doing, what we’re looking at, where we’re going to and write it for us and for potentially thousands of users connected to the network.

And it’s this last aspect which could be problematic: the information could be made available to third parties, perhaps people with bad intentions. In this regard it’s working to make effective the data filtering system.

We have to wait a few more months to see if Samsung will give us a real choice of filtering or if users will have to be willing to barter their privacy for an app of questionable utility.

Save data for millions of years

ottobre 9, 2012 Technology No Commenti

The Japanese company Hitachi in collaboration with the laboratory Kiyotaka Miura of Kyoto University is working on a project that will allow substantial development in the field of saving and preservation of digital data. At the base of this new idea, squares of quartz.

The data will be sculpted with a laser on the highly stable and resistant glass that has been tested and subjected to a temperature of 1000 degrees Celsius for a couple of hours and still remain functional. It’s result also resistant to water and to radio waves and in case of breakage, the data were recoverable. So, according to the company, it could be capable of storing data for millions of years. If we think that the actual media store for a maximum of 100 years, the new technology could be a revolution in the field. Furthermore, the advantage would occur even in less waste of materials: they don’t deteriorate and so they don’t need to be replaced, reducing the physical parts and the wastes.

The quartz glass slides used are about the size of 2 cm for side and 2 mm thick, and the language used for writing is the binary code. The storage capacity is approximately 40 MB per square inch, higher than a CD, but still much lower compared to a modern hard disk able to store up to one terabit per square inch. The burning takes place as for CDs and DVDs with a laser, while it’s necessary an optical microscope to reading.

Hitachi’s new technology will not be on the market before 2015, and the costs will tend to be high. Essentially, the aim of this project is to store data of great importance that need to be passed on to posterity, such as the artistic and cultural information.

To date, there is often problem to recover lost data from PC or mobile phone. There are advanced systems for storing and retrieving these type of data on which we can rely, but paradoxically most of the historical sources of which we can still enjoy are ancient manuscripts on paper and etchings on stones. In the future, archaeologists might find the data of our civilization without problem through slides of quartz.

Place Raider, malware-spy on the smartphone

ottobre 3, 2012 Technology 1 Commento

It would seem an application created by expert thieves, but it has been studied at Indiana University and developed at the Naval Surface Warfare Center for scientific purposes. It’s a Trojans, PlaceRaider, which, hiding in photo apps similar to Instagram and Hipstamatic, is able to enter in smartphones, take pictures and create 3D models of environments in which the unfortunate live in or visit, with a precision that allows to observe in detail the objects. In addition, PlaceRaider would be able to listen live what is happening around, transforming the mobile phone into a real spyphone. So a prying eye might creep into our homes.

At the basis of the project there are the technologies that allow you to rotate images shown on the displays of smartphones. Some additional options would allow to the hackers to take and receive photos only when they are interested, to understand if smartphone is upside down or in the owner’s pocket, to automatically mute the sounds of shooting and to cover preview images of the photos just taken.
Collected data and images, the hacker, he will be able to create a 3D model of the environment in which the owner of the phone moved, calmly observe the objects and obtain valuable informations. For the moment, we can rest assured: this technology is guarded in the laboratory, but soon hackers engaged in industrial espionage or national security or common apartment thieves, could get hold and so it will be necessary take countermeasures.
In the domestic environment, have already been tested systems for bug sweeping that allow you to find microcameras, bugs and transmitters. Meanwhile, there is no danger for smartphones equipped with iOS and Windows Phone systems bacause at the moment the virus works only on Android.

Deads alive…in the memory with the QR code

settembre 26, 2012 Technology 1 Commento

Companion of every moment of daily life, the technology doesn’t abandon us even after the death.

The idea comes from England by Stephen Nimmo, director of the funeral home “Chester Pearce” di Poole, that he thought to enclose the memory of the dead in QR Code (Quick Responses Code).
Invented in 1994 in Japan and circulated with ever-increasing frequency since 2005 with various uses and purposes, the QR Code are a special two-dimensional bar codes that contain within them information intended to be read through the use of a smartphone or other device able to interact with the modules of the square.

The code, place on the gravestone, when is scanned, connect the phone to a web page containing the biography, the pictures and even videos of the deceased.
Friends and close relatives, with passwords, can insert themselves contents and comments, making the memory of the their beloved, interactive and very social.
Those who subscribe the service can create a simple website, with few essential informations, or make it rich and meaningful.
In future, it may become a useful help to try to reconstruct own family tree.

The new system is designed to make known to those who visit the cemetery not only the name, the age and the date of death of who are buried, but a large quantity of informations. QR Codes are engraved on a small plate of granite or metal and then embedded or glued on the gravestones, monuments and commemorative plaques placed on the benches.

The service can cost up to £ 300, in addition to £ 95 for the creation and the hosting (unlimited) of the personal website.

The contents can really be infinite: movies of farewell or greeting, links to Facebook profile, writings and wills. In a not too distant future, it’s thought to a version in augmented reality, “live” thanks to an hologram of the deceased.

Technology doesn’t know more limits: see through the walls, open locks with our eyes and make revive the loved deceased, until not so long ago, were possibilities related only to the science fiction. It’s in any case essential use properly the new inventions that can help us, especially in the fields of surveillance and security.

Surveillance and security, the robot that acts like a guard in the flesh.

agosto 1, 2012 Technology 1 Commento

The Defense Advanced Research Projects Agency is launching a new humanoid robot called Petman that could be used for military or civilian use, in rescue operations, for example. The new robots would not only be able to walk and run, but also to climb stairs, get into a vehicle and drive it, open the doors, free environment from the rubble and save lives. Remote controlled, but only in part, will also be able to “take decisions” by itself to complete its task.

That’s not science fiction, but the result of a continuous competition between researchers at DARPA, which will finance six teams of hardware robotic and twelve other of software robotics. Who will give the best results will have a higher remuneration. A great way to give a jolt to the U.S. Robotics which currently is still a step back to the Asian technology.

Moreover, in Italy, at the University of Pisa, researchers are developing  a robot with facial expression identical to that of humans, (FACE is its name) opening up a movie scenario. Think about how these pieces of technology can be used in different occasions, from every day life, in particular dangerous situations or for surveillance purposes, as if you had a keeper in the flesh, to natural disasters, wandering through the rubble, for example, looking for signs of life, perhaps with the help of tools to see through walls.

All scenarios that are being transformed from imagination, or engineering, to a reality in which men increasingly interact with their robotic alter ego to improve the quality of life and personal safety.

Endoacustica Europe

USA, a robot creates a Wi-Fi network and performs reconnaissance.

luglio 30, 2012 Technology No Commenti
A robot that set ut Wi-Fi Networks

It is not a simple system for cracking Wi-Fi networks, but so much more. It is an robot made of aluminium with the shape of a tank and is able to create a Wi-Fi network and to extend it in potentially dangerous and hazardous places, where connecting to the network is almost always problematic.

Weighing 150 pounds, is strong enough to carry a weight of 200 pounds, but its purpose is not transportation. It is equipped with a Wi-Fi router, a night-vision camera, a satellite tracker, so it can always be monitored, and a lithium battery that lasts up to 12 hours.

It is controllable via a browser interface (this means that it can be monitored from any computer), and contains a series of long-range repeaters that can be deployed at strategic points to allow the connection.

The really interesting thing is that, in addition to extending wireless networks, it can also perform night reconnaissance, moving even on inaccessible terrain, as it is really similar to a tank. Researchers at Northeaster University are studying a system to increase speed and to allow the robot to climb stairs. It has been studied, moreover, a system that will enable it to return to the base if it loses its WiFi connection.

Designed especially for military use, think about how it would be useful in areas affected by natural disasters, where the physical network infrastructure is sometimes damaged!

Endoacustica Europe

U.S.A., a man jams mobile phone calls on a city bus.

luglio 26, 2012 Technology No Commenti
Philadelphia bus

Imagine being on a overcrowded city bus during the rush hour. There are those who converse with their neighbours and those who, instead, talk on the phone out loud, irritating the ear of the passengers. How many times have you found yourself in such a situation? How many times have you wanted to silence them? This is exactly what a man from Philadelphia did. Eric, this is the name with which he introduced himself to the press, bothered by other passengers talking loudly on the phone on a SEPTA company bus, decided to adopt a jammer to jam cell phone signal, a device that he activated as soon as he heard someone answering the mobile.

The man, who thought to go unnoticed, had been observed for many times by a company employee, who had noticed the little device “similar to a walkie-talkie with four small antennae and a button that was pressed each time someone started to talk on a cell phone.” Eric was almost immediately blocked and asked to give explanations. Apparently, the only reason for using the jammer was the trouble that listening to phone conversations of others caused him.

A curious and unusual use of a device that, in other situations, has proved its value. Think about the possible use of the jammer during events or shows, or even during important meetings to avoid distractions or unauthorized recordings.
The jammer also proved to be vital in military operations, such as those conducted by the U.S. military in Iraq, where they used to disrupt the signal, making them harmless, of remotely controlled bombs, one of the favourite weapons of the enemy and that has caused dozens of deaths since the conflict began.

Returning to the case of Eric and to the way he used the device, the man continues to be severely criticized by people on the Web, who wonder whether it is right, and legal, to keep others from talking on the phone in such a public place. “What about if one of the passengers needed to speak urgently with his family or with his physician about important issues?” …

Endoacustica Europe

Researchers reveal the vulnerability of CCTV cameras.

luglio 24, 2012 Technology No Commenti

We live in a world where surveillance cameras are quite wide spread and often give us the impression of living in a huge Big Brother. Despite the various controversies about privacy, they have, however, proved their effectiveness in preventing crimes and in helping to identify and stop dangerous criminals.

However, it has been shown that the usual closed circuit television cameras have a very weak safety system: they are often sold with Internet remote access enabled by default, and with a preset weak password. This allows hackers to control them and to favour, in this way, criminal actions.

According to researcher Justin Cacak, safety manager of Gotham Digital Science, as a result of “penetration tests” carried out for customers to discover the vulnerability of the security of their networks, it has been demonstrated how these devices can be hacked and viewed from any part of the world.
Banks, research laboratories, universities, businesses, homes and other sensitive sites, are thus exposed to a huge risk: hackers could take control and steal important information and projects, or simply violate the privacy of thousands of people without these may realize.

So, remote access to these devices is possible if the manufacturer allows such an access as a default setting. Moreover, in most cases, these settings remain permanently for the simple fact that users do not know how to change them, because they’re not experts. The situation appears even worst if you consider the fact that preset passwords are very weak and thus easily decipherable.

In this way, according to experts headed by Cacak, it was possible to enter the conference rooms of different important companies, such as the Boardroom of Goldman Sachs. That’s why it would be important, according to researchers, disable remote access to these surveillance cameras, provide them with stronger password or simply use a different type of micro-cameras.

Endoacustica Europe

Calendar

aprile: 2017
L M M G V S D
« Mar    
 12
3456789
10111213141516
17181920212223
24252627282930

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A SpyPhone or GSM Spy cellphone, is a normal mobile phone, where a software has been installed, which allows a third party to monitor the activities of the phone user. To avoid suspicions, a Spyphone must be given either as a present (for family members monitoring) or given as company equipment (for personnel monitoring).

 MICRO DIGITAL RECCORDER
digital video recorder Micro digital recorder with vocal activation have recording time of 1200 hours long. They went out from the big screen to enter by force in the life of every day, in the most diverse situations that until a few years ago even the vivid imagination of a writer of espionage could have imagined.
 WALL MICROPHONES
Wall microphones to listen through walls up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …