Home » Technology » Articoli recenti:

3G spy camera, a big step forward in video surveillance.

maggio 28, 2012 Technology No Commenti
remote surveillance

Until a few years ago, it was pure fiction to think about a device that would provide immediate access to any place across the globe, allowing you to see and listen to what was going on. The technology, however, has now reached levels previously unattainable, enabling a remote real-time control of any place, be it internal or external.

3G spy camera is a little jewel of technology that allows audio and video surveillance directly from your UMTS mobile. It can be installed in different environments and in mobile vehicles as well.

It works in video mode only when there is UMTS network coverage, otherwise it acts like a normal audio bug. If necessary, it also allows to record files on Micro SD memory up to 32 Gb and to send them to an e-mail box.

The 3G spy camera is the ideal tool for those who need to remotely monitor their home or workplace, especially with the increase of burglary in these times of economic crisis.

Its really small size and weight (only 43x40x8 mm per 10 grams) enable you to hide it anywhere, from home appliances and furniture to the interior of a car, without anyone noticing it. With a video resolution of 320×240, the 3G spy camera allows you not only to record video in MP4 format, but also to take pictures at a resolution of 640×480.

Easy to use and configurable via text messages, with a simple video call to the number listed in the bug, from any UMTS phone, you can real-time control at a great distance what is happening in the place under surveillance. For the audio mode, however, in case of lack of UMTS coverage, you just need a simple voice call from any phone.

It features a Voice Activation Sensor (VAS), which turns the device on when it detects a noise that exceeds a certain threshold, and a ultrasensitive microphone that, despite its small size (only 5.6×4.0x2.3 mm), provides excellent sound quality.
Moreover, the 3G spy camera is powered by a 3.7V lithium-ion battery, rechargeable via USB cable or charger, all supplied in the kit.

Ideal for those who need to remotely control places or people, this device represents a major step forward in technology, as well as a valuable aid in the prevention of theft of various kinds. Powerful and easy to use, you do not need to be a leading expert in these technologies to employ it.

Burglary and the need for increased police patrols.

maggio 24, 2012 Technology No Commenti

Burglary, shoplifting and other petty crimes against property are increasing. This is what you can easily learn from newspapers, TV and the Internet.

Most thieves are amateurs but in this time of economic crisis it is almost becoming a job, a way to scratch along.

In many countries a crime helpline has been founded to help the people to overcome the consequences of having been victims of burglary.

Maeve Ryan, co-ordinator of the Irish National Crime Victims Helpline, said that “The number of people seeking help was up from 783 to 838 for the first three months of the year, with a noticeable increase in calls about theft.”

“This is a crime which can have serious effects on the people affected,” she said. Not only material effects linked to the loss of the things stolen, but also psychological consequences, due to the fear people experience after a break-in, because “once it has happened the fear is that it will happen again”.

And there are also other questions such as repairing damaged doors and windows, difficulties with insurance claims, the need to upgrade security systems, and the worry about the impact of the crime on children.

Not only burglary in houses and shops, but also theft and fraud in businesses are increasing. Valuables, food, money and technological devices are stolen, but also business cars and means of transport.

For this reason business owner are asking for increased police patrols, even though probably the best way to monitor their property would be the installation of state-of-the-guard surveillance systems, out and in warehouses, plants and offices, because you do not have to forget that many times the thief is among the staff.

There is a greater need for collaboration among employees, despite cuts to staff, due to the current economic crisis, and their growing resentment towards the company.

In fact, as it is shown by a research conducted by the American consultant Marquet International Ltd., 2010 has been “the year of internal fraud to business.” According to the report, in 2010 internal fraud has increased by 17% compared to 2009. Issues of misconduct of employees will continue to grow in relation to rates of unemployment, which now amount to 10%.

The risk is greater for small-medium enterprises, which have less resources in terms of personnel and are not able to implement adequate prevention and control measures.

To catch the criminal in the act, they could find very useful video surveillance devices, such as the new 3G spy camera, which can be easily concealed in any place and is hardly detectable.

While GPS locators can be used to monitor business means of transport, to track all of their movements. In short, a cheap solution for an expensive problem.

A gender-sensitive approach to Terrorism.

maggio 23, 2012 Technology No Commenti

Counter terrorism should move away from militaristic approaches and base itself on people-oriented solutions, that is on gender-sensitive sustainable interventions.

This is what has been claimed by Pakistani scholar Maleeha Aslam, during the presentation, organized in Islamabad by the Sustainable Development Policy Institute (SDPI) , of his latest book “Gender Based Explosions: The Nexus Between Muslim Masculinities, Jihadist Islamism and Terrorism”, in which the doctor tries to find the connection between the glorification of Muslim masculinity, Jihadist Islamism and terrorism.

Member of Wolfson College, Cambridge and Fellow of Cambridge Commonwealth Society, Dr. Aslam wants to emphasize how gender dimension has been underestimated in searches for a solution to terrorism.
“In Muslim societies, socio-economic and political oppression coupled with culturally idealised gender constructs, lead men towards militant Islamism and terrorism.” She underlined that anti-terrorism policies which involve surveillance and racial profiling provoke Muslim men, because they are an attack on their honour and on the way they behave in society. In her study she also states that religious affiliation has nothing to do with offering oneself for Jihad. In fact, the majority of practising Muslims is against suicide bombings.

The doctor then continued his speech by saying that Jihadist Islamism will continue to grow tremendously if we do not change the point of view in the matter, if we do not understand that terrorism can be fought only by peaceful means, sensitive to gender differences.

“It’s a man’s desire to prove himself that draws him to violence.” Not the affiliation to a particular religion, but the men’s egocentric behaviour.
Therefore, no military program or solution that still makes use of violence would help Governments to fight against terrorism, according to Dr. Aslam point of view. Moreover, also the use of tools for surveillance, such as eavesdropping devices or GPS locators, would be ineffectual These devices, used for the monitoring of suspects, would only hurt Muslim men’s ego, bringing them to follow extremist ideas, maybe otherwise never joined.

Militarism, then, is cross-national and cross-religious. It is not about religion but the individual itself. So it is important to shift the focus from religious ideologies to gender-based behaviours that would be the same in different parts of the world and not only in Muslim areas. In fact, the researcher points out that despite U.S. society is sensitive to gender issues, we have witnessed a cruel behaviour of American soldiers toward Iraqi prisoners.

Twitter blocked for several hours in Pakistan, an attack against freedom of expression?

maggio 22, 2012 Technology No Commenti
censored twitter

“The reactions were mixed. Some thought it was outrageous to put a stop to the voice of youth. While some were glad that now my daughter/son will finally spend some time with us.” This is what a young Pakistani writes on his blog about Twitter block occurred the 20th of May.

Supposedly for having spread “blasphemous material” about the Prophet Mohammed, two days ago Pakistan briefly blocked the microblog and restored access few hours later.

As we can learn from Indiatimes.com, it was banned for several hours because “it refused to remove posts considered offensive to Islam,” said one of the country’s top telecommunications officials.
The tweets were promoting a competition on another Social Network, Facebook, where images of Islam’s Prophet Muhammad were posted, said Mohammad Yaseen, chairman of the Pakistan Telecommunication’s Authority. Many Muslims consider depictions of the prophet, even favourable ones, as blasphemous.

“Both Facebook and Twitter were involved. We negotiated with both. Facebook has agreed to remove the stuff but Twitter is not responding to us,” he said. For this reason it suffered the ban. Nothing new, in any case, considering that these two Social Media were blocked, along with Youtube, for two weeks in May 2010 due to a competition organised by an anonymous user who called on people to draw the Prophet Mohammad to promote “freedom of expression”.

It goes without saying that what is really interesting in all of these cases is the users’ ability in bypassing the censorship obstacle by using different tricks. In fact, even before the service reactivation, they had already batten down the hatches using cell phones to send the micro messages, secure browsers like Opera Mini or advanced proxy softwares like Vtunnel.

Today is increasingly easy to put under control single or few computers through the use of remote computer monitoring systems and keyhunters, but facts show how difficult it is to place under surveillance millions of people on the Web.

In fact, this is precisely what Twitter tried to underline in its own defence. The microblogging site, which in February reached 500 million active users, said, in reply to accuses, “We are not able to stop any individual who does something of this nature on the website.”

Another relevant point of the question, which sounds a little bit bizarre, is that Yaseen said Sunday afternoon that Pakistan’s Ministry of Information Technology had ordered the telecommunications authority to block Twitter because the company refused to remove the blasphemous tweets, but we still do not know what led the ministry to the decision of restoring access to Twitter Sunday evening, even though the Social Medium had not removed the offending contents yet.

Intelligence and privacy violation. Does America lives in a huge “Big Brother”?

maggio 21, 2012 Technology No Commenti
terrorism and surveillance

In the late Eighteenth century, English philosopher Jeremy Bentham designed the institutional building of Panopticon. Bentham himself described the Panopticon as “a new mode of obtaining power of mind over mind”. The design consists of a circular structure with an “inspection house” at its centre, from which the managers of the institution are able to watch the inmates without them being able to tell whether or not they are being watched.

Fancy or reality, according to the American Civil Liberties Union, this is more or less what is happening in the United States, due to a continuous and increasingly intrusive surveillance of citizens by Government, through a systems which also involves citizens themselves and private corporations in collecting data and information about population.

“Acting under the broad mandate of the “war” on terrorism, the U.S. Security establishment is making a systematic effort to extend its surveillance capacity by pressing the private sector into service to report on the activities of Americans.”

This is what is written in the ACLU report, according to which “Information held by third parties was either assumed to be innocuous or protected by professional codes of confidentiality.” In this way Government does not fear for political or legal repercussion.

In the report, the ACLU writes that Government has created several programs to control Americans’ lives, supposedly to defend the Country from Terrorism after 9/11.

In January 2002, for example, the Justice Department created a program called the “Terrorism Information and Prevention System,” or TIPS. Considered as “A national system for concerned workers to report suspicious activity,” the program would have recruited “millions of American utility workers, letter carriers and cable technicians to report to the Government anything that they considered an unusual or suspicious activity.”

Bush also called for “Neighbourhood Watch” programs to be doubled in number and expanded beyond their traditional role of deterring and detecting household burglary to involve them in preventing terrorism.

These are only few of the State reporting programs listed in the Surveillance Industrial Complex report, in which authors underline how, beyond these organized watch programs “there are more diffuse campaigns of citizen awareness featured on government Web sites around the nation. These campaigns urge Americans to be suspicious, and to report to the authorities anyone who fits a long list of suspicious characteristics.”

From 9/11 now, there are almost 6000 organizations, of which 2000 are private institutions, which not only cooperate with Government in keeping public order, but also collect an enormous amount of data about individuals and monitor them, probably also through the use of high-tech tools, such as covert listening devices, micro digital voice recorders and spy cameras.

Supposedly to track down potential terrorists, this enormous “big brother” is not only destroying Americans’ right “to be left alone”, but is also creating a huge business which does not suffer from the economic crisis.

Terrorism: a guide for Western people converted to jihad.

maggio 18, 2012 Technology No Commenti

“Muslims follow a religion of peace, mercy and forgiveness, and most of them do not have anything to do with the violent events somebody has associated with Muslims. If a Muslim commits an act of terrorism, this person is guilty of violating the laws of Islam. ”
This is what we read on a website that introduce itself as a guide to Islam. Ideas which any human being agrees with.

However, on the Internet it is possible to find an English guide on how to become a perfect terrorist and how to export the creed of Al Qaeda to the West. A handbook for Western converts to jihad, in other words, written by Samir Khan, an American who worked for the Yemeni cell of Al Qaeda and who was killed by a drone (unmanned aerial vehicle) together with the radical Imam Anwar Al Awlaki.

There are several chapters in the guide and all deal with different aspects of a terrorist life. He is given, for example, some advice about personal hygiene in precarious situations, “a daily shower is ideal but in many cases is not possible.” Terrorists are encouraged to keep in order the environments in which they live, and they hide, often shared with other “brothers”.
The handbook even discusses the possibility for a terrorist to take along his family. However, he is discouraged, to avoid seeing their loved ones raped and tortured, if they were discovered.

In the section entitled “Air Bombing”, Khan describes the sound of the drones, “as the buzzing of a bee,” and advises his potential disciples, in the case of fear, to think about the virgins of Heaven and the prophets that they are going to meet once dead.
Surely the most important and interesting chapters are those in which he gives practical advice on terrorism targets and guidelines to be complied with in order to avoid being detected.

He writes about “attacking America in his own backyard” because in this way the resonance, the effect and consideration that they would get, is much stronger, especially if the attack is carried out by a single individual, more difficult to control.
So, with the spread of the Web, it is even easier for terrorists in general to disseminate their ideas and get emulated in and against Western countries. They have moved, in fact, from the initial face to face indoctrination to pamphlets and books, up to the Network, Youtube for example, and dissemination of guides on it.

Fortunately, however, the technology is not always in favor of terror. For this purpose, in fact, Khan emphasizes the importance of not using cell phones for communication, to avoid being wiretapped in some way. Who knows whether he has considered or not the fact that maybe intelligence service can monitor potential terrorists through state-of-the-art eavesdropping devices and video surveillance systems, such as 3G spy camera which allows you to see, with a simple video call,what is going on in the place where it is concealed or, in the case there is no UMTS network coverage, enables at least unlimited and high sound quality remote listening.

Discovering and fighting usury with the use of bugs

maggio 8, 2012 Technology No Commenti
picture against usury

Reading the newspapers in these last months, on a first sight you can easily understand what is going on all over the world: the economic crisis is having devastating consequences on society, of which it is slowly eroding the fabric, making those who have problems performing extreme measures, such as criminal actions or suicide.

The economic crisis in Europe has affected several nations, but Greece, Ireland and Italy the most, and an alarming increase in suicide rates among entrepreneurs and small-business owners is leading some European newspapers to call the trend “suicide by economic crisis”.

Furthermore, reading the newspapers and watching the television you can also understand how the crisis is leading people to commit different crimes: burglary, drug pushing and usury.

Yesterday in Italy, for example, five people were arrested for having lent money at usury rate to several Tuscan entrepreneurs, threatened and intimidated with actions which are typical of the mafia behaviour.

To get rid of from the clutches of usury is not simple. You may fear retaliation in case of complaint against the loan shark, the same retaliation you would probably have in case of nonpayment.

Nevertheless, who is victim of usury should find the strength to face the problem for his own good and for his loved ones.

It goes without saying that cooperation with the police force is vital, but to catch the usurer red-handed you can rely on several technological devices, such as bugs and micro digital voice recorders. Thanks to their small size, they can easily be hidden in any medium, allowing the person who brings them with herself to have her conversations listened and recorded. In this way, the police can intervene at the right time and arrest the criminal.

Your routes in a few clicks, with the GPS tracker

maggio 4, 2012 Technology No Commenti
Route from a gps tracker

The tracker is a small and efficient portable GPS locator that allows you to chart your course anywhere on the Earth.
This GPS tracker can be easily concealed due to its small size, to a removable magnetic support and to a belt clip, which allow you to hide it discreetly in any medium whether you are in the sea, on the street or on a plane.
Simple to use, this particular GPS tracker can work for over a month with the power of only two AAA batteries, allowing you to record your routes for weeks. Furthermore, it has a 4MB flash  USB memory that, connected to a PC and through the use of a mapping software like Google Earth, can easily show your routes, with no additional costs.
Do you like cycling or jogging? With the new GPS tracker you will be able to control your sport performances, checking how far you ran.
You may also feel the need to monitor a person who is supposed to be in danger. Nothing could be easier with the GPS tracker! All you need is to get that person to bring with herself the GPS locator. In this way you will obtain the map of her course.
Does your son have a strange behaviour and do you fear for his safety? From today on, you can also rely on a GSM bug with a GPS tracker.
If your need is not only to track and record a route but also to know what is happening in a particular circumstance, you could obtain a GPS tracker embedded in a GSM bug.
Easily controlled from anywhere in the world, the GSM bug allows those who control it to catch conversations and background noise with excellent sound quality, thanks to a highly sensitive microphone.
Hidden in a backpack or a piece of clothing, the GSM bug allows you not only to know where your son is but also to find out what is happening around him. All you have to do is making a call from any phone to the number of your bug.

Politic repression against the population in Syria: three american companies accused of having provided the Damascus regime tools for wiretapping and monitoring of dissidents

novembre 28, 2011 Technology No Commenti
syria protest

United States of America are not only exporting democracy, but also controlling tools sold directly to ‘rogue governments’ and schemes. Of course this practice is not new, but lately it has become a little awkward in the Obama administration.

The U.S. Commerce Department is seeking whether the technology produced by a Californian company, has been able to help the Syrian Police to map and monitor dissidents by bugs. Revolts have been followed by a violent and bloody repression that led to the death of thousands of unarmed civilians.

Trade officials are trying to know if Blue Coat Systems of Sunnyvale, Calif., was aware that its equipment and its software could be used by the Syrian government.

The company has already clearly expressed that it did not sell tools or spy software to the Syrian government, but it is aware that its products are used, however in Syria and maybe the regime got them through a third party. The U.S. sanctions imposed on Syria prohibit the tradings of most of the categories and the investigators are trying to determine who gave the Blue Coat technology to Syria.

Here is a declaration from the company, dating back to this month: “Blue Coat is aware of the violence in Syria, and is really sad because of the suffering and loss of human lives that could be the result of actions made by a repressive regime. We do not want our products to be used by the government of Syria or any other country embargoed by the United States.”

According to statements of the company, Blue Coat technology is not designed for surveillance purposes, but it has features that could help the authorities to monitor electronic communications, even allowing to block selected people access to certain websites and certain forms of social media.

Few days ago, in U.S. Parliament, three senators asked the Obama administration to see if Blue Coat and another California company, HP, have been provided with “instruments of repression”  Damascus.

“If the sale of US-made technology devices may have contributed to the ongoing violence, it is unacceptable and a solution should be investigated as soon as possible.”
If the Commerce Department found out that Blue Coat has clearly violated the license, U.S. could make the company pay a fine up to $ 1 million.

U.S. companies wishing to export devices that are “primarily used for hidden interception of oral or electronic communications cable” must contact the Department of Commerce for a license, according to current regulations regarding export. However, sales by U.S. companies in Syria are illegal, starting from the sanctions imposed by President George W. Bush, in 2004.

There’s more. During a Congress audition that took place on November 9, the Assistant Secretary of State, Jeffrey Feltman, said that the Blue Coat technology used in Syria, no export license had been granted.

In addition to Blue Coat, there is also Hewlett-Packard (HP), which has installed more than $ 500,000 of equipment in computer rooms located in Syria. These electronic brains are the basis of a surveillance system being built, able to monitor the use of e-mail and Internet in the country. The operational base of HP is therefore a control center for Syrian officials in Damascus, with whom they could keep track of citizens’ communications and track datas, models and personal contacts. An Italian company, Area SpA, is in charge of running the project.

“HP’s policy is to comply with all applicable export control laws and regulations of the United States,” the company said in a declaration. “We have no employees or facilities in Syria, and our sales in this country have been limited to groups that are recognized by U.S. law. Compliance with the United States and the laws of international trade are the highest priority for HP. “

BiKN and your Apple iPhone become a powerful device to find lost objects and even people

novembre 22, 2011 Technology No Commenti
localizzatore per iphone

When we talk about Apple’s mobile devices, namely the iPhone, we know that we can find a huge variety of gadgets and cases to protect it and keep it safe. We also know that there is a software to locate your phone via GPS in the unlucky event of theft or loss. Perhaps we did not know that engineers from Treehouse Lab have designed an interesting way to keep track of everything: phone, keys, wallets.

We are speaking about an innovative system, designed specifically for those who often lose things around, either because they are careless, or because they are running into a busy life, full of unexpected events.

The new system is called BiKN, a term that is pronounced as “beacon”: just as a light it acts illuminating your life, helping you to regain everything lost (if it bears the rught tag).

But let’s step back and focus on the system, thet consists of a special case for the iPhone keeping inside a receiver that interacts with a tracking tag. On your phone, a special iOS application manages the operations, allowing you to locate up to 8 cards simultaneously. All you have to do is to stuck ‘tags’ on items that you often lose.

Your bag, key ring, camera, wallet or even your dog (putting the special ‘tag’ on the collar). But the most interestingthing regards the possibility to set a maximum distance for each item, after which an alarm on the BiKN iPhone case. In this way, busy parents shoppingin the mall will not have to worry too much when they leave their children in the playground area.

User interface is clear and intuitive. “Find” mode includes an audio and video signal meter that helps you find everything that has been lost, every item that has gone out of place. The “Leash” function activates control within exact spatial boundaries. “Page” mode will sound an alert on one or more active tags (or other devices compatible with smart BiKN), becoming very useful for  families or groups.

The special BiKN clips are designed to be easily stuck to any object, a belt, a keychain, a pocket of a jacket. Each tag is equipped with a plug that opens and reveals a micro-USB port, letting users to set and synchronize via the BiKN iPhone case every single clip. in a mall.

Once purchased the case, the USB tag can be bought with an extra charge and they have to be charged through a computer. All equipment is useful and very practical and it will be available in 2012 for Apple iPhone 4 and 4S. There is still no information about the price.


novembre: 2019
« Giu    


Newsletter Endoacustica Europe - ENGLISH


Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Find the exact vehicle position with the QUAD-TRACK tracking module

13 Apr 2018


Real time tracking of cars, motos, trucks, containers etc. Extremely resistant, waterproof/weatherproof device! Are you looking for a compact, efficient and professional GPS tracker to find a vehicle position? Well, in this case Quad Track is the best choice you can make. This brand-new quad band real-time locator system has indeed a higher gear than other similar devices on the market today. For example, it allows to follow the path …

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …