Buying a bug transmitter on Amazon without knowing where it is from? Actually it is not a good idea!

“You know what? I bought this spy bug on Amazon, but now I am not able to make it work!” This is a typical comment submitted on Amazon or Ebay after having recklessly purchased the product in question. Actually we have been saying that for long time: before buying any …

KA-101: a full audio monitoring kit fitted with spy bug, receiver and micro recorder

Are you on the fence about the audio monitoring device to be used in your investigation? Well, KA-101 is just the device you need! Not only because it makes a combined use of bug transmitter, RF receiver and mini recorder, but also because it is more affordable than other devices …

Which video bugs are better to use in investigation?

Do you think audio bugs are the only surveillance devices to be used for monitoring rooms or any other environment? If so you’re barking up the wrong tree, because over time investigative technology has increasingly developed UMTS or WiFI video bugs, proved to be very effective in undercovered or remote …

Economic dependence and cheating: a study reveals a possible correlation

A few years ago, on the site of ASA (American Sociological Association) was written up an article concerning a possible correlation between economic dependence on one’s partner and a large number of cheating cases. In the article, the US sociologist Christin L. Munsch, a researcher who spent a long time …

Microregistratori digitali

A photo camera, a camera bag or…. both of them?

marzo 4, 2010 Technology No Commenti

Cloak Bag

For those who want to protect their photo camera in case of rain, for who wants to take quick shots without being immediately noticed, or simply for those who are just too lazy to take their camera out of its bag but still do not want to miss a single snapshot.

For all these situations and many more, a new product, called Cloak Bag, has just been launched on the market. At a first sight, it looks like your ordinary camera bag, but at a closer look you can see that it has a little secret: its bottom can be removed by unzipping it open, thus revealing its contents.

The photo camera is placed on the upper half of the bag, and by opening a slit on the side you can grab it and quickly take photos through the now open bottom. Thanks to its size and features, this bag is mostly suitable for reflex type cameras (SLR), which can be a little uncomfortable to use since they are not as quick as a digital camera, or because, especially in big cities, using them may not always be safe.

In some parts of the world, in fact, sometimes a gesture as simple as pulling out your camera (especially if it is as expensive as a SLR generally is) is tantamount to an invitation for pickpockets. For this reason, you may lose that special moment or that particular sight just out of fear that your camera might get stolen.

By using the Cloak Bag, the gesture is so quick and discreet that any potential robber would not have the time to figure out what you are really doing, and would not be able to do his dirty job.

In short, by spending a mere 49 dollars, we will no longer have to regret those pictures we could not take!

Stealth Phone, the untraceable phone

marzo 1, 2010 Biotechnology No Commenti


Those who, either professionally or as simple users, are involved with telecommunication security, know that encryption of telephone calls makes them more difficult to be bugged, but not impossible, especially if only one of the two users engaged in a conversation is using an encrypted mobile phone, while on the other side, his counterpart is using a common cellphone, which may be comfortable but is constantly exposed to the threat of eavesdropping.

To make sure that its calls can not be listened to, an encrypted cellphone must communicate with a similar equipment, which carries the same encoding key. By using this protection, a third party listener would only be able to hear noises; this means that encrypted mobile phones are not safe from eavesdropping per se, but make it impossible to understand the content of an eavesdropped phone call.

On the other hand, using a Stealth Phone you have in your hands a device which does not encrypt or encode its calls, but makes itself impossible to detect for any interception attempt, by dynamically changing its IMEI (International Mobile Equipment Identifier) number, that is, the number that uniquely identifies every handset.

In fact, telephone interception operations are carried out not only based on the telephone number, but also according to this identification number, allowing a malicious third party to intercept your calls even if you change your SIM card on your phone. This because it’s not only the number that is scanned, but also (and mostly) the handset itself.

By changing its IMEI number each time that it is turned on or off, or any time that you change the SIM card on the inside, a Stealth Phone basically turns itself into a new cellphone every time.

The IMEI number is made up of 15 digits, which makes it virtually impossible that the numbers, automatically generated by a software installed on your Stealth phone, could ever be repeated; by doing this, every day you will have a different phone, and will be protected from third party listeners who may have picked up your IMEI number.

In the very unlikely event of an unauthorized access attempt, you will instantly receive a notification, either via an alert message or a discreet vibration; all you have to do at this point is turn off your untraceable phone, then turn it off again to be able to resume your conversation where you left off, without any further privacy concern.

In a few words, the difference between encrypted cellphones and invisible mobile phones lies in the fact that, while an encrypted phone protects the contents of the call by making it impossible to understand, Stealth protects the phone call itself, making it impossible to intercept.

In the same fashion, though, usage of a Stealth Phone does not guarantee protection against any eavesdropping which might be aimed not at us, but rather at our counterpart; for this reason, when you are engaged in a phone call that you would like to keep as strictly confidential as can be, it is advisable that both parties use the same kind of protection.

A phone call between to untraceable Stealth handsets protects you completely against outside listeners, allowing you to freely discuss the most confidential and private of matters, without any fear that your words may be picked up by prying ears and used against you.

For more information about how an untraceable phone works, as well as on encrypted phones and a wide range of devices for protection of your privacy, we recommend that you visit the Endoacustica website, where you can contact our experts for advice tailored on your needs.

Mobile phone bugging is now made easier

febbraio 22, 2010 Technology No Commenti


If you are using your mobile phone frequently, especially for private and confidential conversations, or if because of your work you always have the handset on to carry out negotiations or exchange information, a small piece of news which appeared on newspapers worldwide should legitimately sound as a warning to you.

In fact, just a few weeks ago, a young hacker from Germany has declared that he has cracked the encryption key that is used to transmit voice and data over the GSM network. This standard key is adopted by all GSM network operators worldwide, and is based on a 64-bit algorithm which, no matter how safe it is, is still much less complicated to decipher than one might think, especially when compared to the highly advanced 128 or 256-bit keys in use on more recent systems, not only in telephone communications field.

Of course, the kind of job necessary to force the codes such as the one in use on GSM networks, called A5/1, is not so easy as to be done by anyone, and the devices used for this kind of operations are generally very expensive, which so far made this technology accessible only to government agencies and law enforcement.

Anyway, during a worldwide hackers’ symposium, one of them revealed that currently it is actually possible to sneak into the GSM network, by using simple equipment which costs not more than 3000 dollars. Once this device is started, all you need is 30 minutes of work and you will easily be able to listen to mobile phone conversations within the range reached by this system.

On top of this, with software tools such as Java Virtual Machine, it is possible to install any kind of program on a mobile phone, and the user would not even notice it, making it possible to remotely listen to his conversations, turning the handset into a real spy phone.

This said, what can the ordinary mobile phone network user do to protect himself from such invisible threats?
Of course we can not just stand still waiting for phone operators to upgrade their security standards, and in the meantime have our phone conversations exposed to the risk of being bugged.

The best option we have is to add one further layer of security on top of the GSM encryption, by providing ourselves with an encrypted mobile phone, that is, a normal cellphone on which a particular software is installed, that encodes its conversations, by using a 256-bit encryption key, much safer than the 64-bit standard GSM network key.

The conversation between two encrypted phones takes place following the same principle as key-protected email. By making sure that both cellphones engaged in a conversation share the same encryption key, any eavesdropping operation which could get through to the encrypted conversation would only be able to hear a white noise, and this means that your phone calls are absolutely secure.

Therefore, you will easily be able to talk about sensitive subjects, or carry our confidential or sensitive negotiations over the phone, without any fear that your conversations might be bugged by any prying ears. Naturally, if your counterpart has a mobile phone which is not equipped with the same encryption system, should his phone be bugged, your voice could be heard; it is therefore advisable to use at least two (or more) encrypted cell phones, to be used by the people whose conversations you wish to keep secret.

For more information about how the encryption software works, and the models of mobile phones on which it can be installed, we advise you to visit the Endoacustica website, and contact our specialists for specific advice tailored on your needs.

Stealth Phone and anonymous SIM card, for an absolute privacy

febbraio 9, 2010 Technology No Commenti

More than once, on this blog we mentioned the Stealth Phone, that is, a mobile phone which, thanks to a piece of software discreetly installed, is capable of working on the IMEI (International Mobile Equipment Identifier) number, which unequivocally identifies each and every cellphone in the world, and of making itself fully protected from any attempt at eavesdropping.

In fact, mobile phone call interception is carried out noy only, as one might think, by searching for the phone number, but also by using the IMEI number which identifies the handset, as well as the IMSI which is used to authenticate the SIM card mounted on our phone.

In most Western countries, SIM cards can be purchased only by presenting an identification document, and for many network operators they are also linked to a specific handset and its IMEI number. In practice, phone and SIM card are unequivocally linked to a person.

If you need to use your phone for private conversations or confidential business talks, it is advisable to keep the privacy level high by using an untraceable phone just like Stealth, which changes its IMEI number automatically each time it is switched on, basically turning into a different hone each time you use it.

Together with Stealth, the best way to maintain your anonymity is by using a rechargeable SIM card, not connected to any subscription contract which might reveal your identity to others. The problem is that in most countries, even to purchase a rechargeable card, a personal document must be presented, and this means that we would not be able to achieve a fully anonymous phone experience.

Fortunately though, thanks to Endoacustica it is possible to purchase form an extensive selection of anonymous SIM cards, that is, rechargeable phone cards, manufactured in several foreign countries, that do not require an identity document to be presented.

Furthermore, with this kind of service, recharging your credit on your mobile phone can be done with a Western Union money transfer, instead of using a bank transfer or, even worse, a credit card purchase, transactions which could become a visible link between your person and the anonymous phone number.

By adding an anonymous SIM card to a Stealth untraceable phone you will be completely safe and protected from interceptions.

In order to add one further layer of protection, we have created a new version of our Stealth software. This version, which can be used on a normal Nokia 6021 handset, will allow you to receive a notification in the highly unlikely case of an interception attempt.

In that case, your Nokia Stealth will discreetly vibrate, and at that point all you have to do is switch it off, then turn it on again to have a new IMEI number generated, and be once again safe from any unauthorized attempt at listening to your calls.

Thanks to these simple precautions, you will be able to carry out confidential business talks, private negotiations, or simply stay in touch with your loved ones, in a completely safe manner. Just make sure that your counterpart is equipped with the same level of protection and the same equipment, and you will no longer need to worry.

For more information about anonymous phone cards and invisible phones, we advise you to visit the Endoacustica website.

Micro Earpiece: Equipment No Surveillance Agency Can Afford to Neglect

febbraio 8, 2010 Technology No Commenti

Wireless Micro Earpiece

Jagson Global Network was a private detective agency run by Mr. Steve Jagson. He had a small team of eight detectives and its office located at the top floor his apartments. Jagson had over twenty years of experience in detective and surveillance activities. The agency was just four years old but gained quite a reputation for itself in the field.

The credit belonged to none other than Jagson and his acumen in utilizing advance technology for the purpose. But many times, communicating secretly with the men on mission proved troublesome for him. His men needed his guidance at many crucial moments but could not communicate openly. Going away from the scene to communicate or use of mobile phones proved a distracting and wasted lot of crucial time.

Jagson was hell bent on finding a perfect technical solution to discrete listening problems in surveillance activities. He approached none other than Endoacustica Europe, leading manufacturers of surveillance equipment. After going through their unbelievable wide range of products, he picked up Ear-GSM kit. It is a cordless invisible micro earpiece that snugs inside the ear and is almost invisible to the naked eye.

This 12x6x5 mm piece is so powerful that it can covertly listen to any conversation, without compromising on clarity, from where a cell phone is kept. It works with transmitters as well as cellular phones. This invisible micro earpiece can receive voice signal from any distance. Its standard zinc-air battery can last 50-100 hours. To adapt to latest technology, it comes with Bluetooth collar as well.

The performance of Jagson’s team enhanced dramatically. With the help of invisible micro earpiece, Jagson could guide and control his men precisely to accomplish missions.

An Illegal Empire Comes Down Crashing

febbraio 5, 2010 Technology No Commenti

An Illegal Empire Comes Down Crashing

This was going to be a never before opportunity for the City Police Department. They got an inside information that Mr. Robin Leister was hosting a big bash on his marriage anniversary; and many people wanted by police were expected to attend the party.

Leister was a famous industrialist. He made his fortune mainly in brewery and liquor business. But the police knew that he ran a drugs racket under the disguise and his anniversary bash will be attended by many people linked to his racket and drug paddling.

City Police Chief Mr. Pereira was ready with his plan. He printed a fake invitation card and trained one of his best personnel to attend the party. It could fetch crucial information about the drugs racket and the people present over there. But the problem was that except him, nobody knew the insides of the mansion where the big celebration was planned to be held. Further, only he could give the clues about the people at the party and how to deal with them.

Pereira’s experience and research came handy. He purchased Micro earpiece, a wireless ear piece that could enable discreet, two ways communication. It is so tiny that it could easily fit inside the earlobe. It requires very less energy and can operate for 15 to 30 hours on zinc-air battery. It is so sensitive that it can pick up very subtle and distant noises but filters unnecessary background noise.

Need not say, with the help of Micro earpiece, a wireless earpiece Pereira guided his man precisely to go around in the party, talk to various guests and collect critical information about the drug racket. A tiny wireless earpiece brought an illegal empire down.

How to turn a mobile phone into a bug

gennaio 28, 2010 Technology No Commenti


One of those actions that we take automatically and without thinking, such as turning off our mobile phone, is basically just like hanging a “Do Not Disturb” sign outside a hotel door when we want to sleep a bit more, and allows us not to be disturbed by people we do not really want to talk right now, enjoy a bit of privacy or maybe just take a short nap.

Along with all this, switching off their mobile phone might mean, for those who have something to hide, that they can talk about their private business, without worries or fear to be disturbed by prying ears… or not?

If the person in question is unaware that he is actually using a spy cellphone, the answer to this question is indeed a no. In fact, modern surveillance technology allows you to turn almost any phone equipped with Symbian operating system, into a full package for remote long distance surveillance.

Thanks to the installation of a spy software, it is in fact possible to keep constantly under control the person to monitor, listen to their conversations in real time as soon as a call is placed or received, receive on your cellphone a copy of all incoming and outgoing text messages; furthermore, for mobile phone models equipped with GPS navigation system, you can also receive geographical coordinates of its position, so as to know at any time where it is.

But certainly, the most interesting function featured by Spy Phone is certainly the one that allows to use your spy handset as if it were a real bugging device, just like the ones you see in spy movies, to listen not to incoming or outgoing phone calls, but rather to conversations taking place around it.

To do this, the spy software secretly installed on your spyphone uses the handset’s microphone to pick up sounds and voices within a range of approximately 5 meters. Just call from your normal cellphone, whose number has been stored as monitoring phone upon installation, and something amazing and unexpected will happen.

In fact, by calling from this number, the phone will not ring, nor will the phone call leave a record in the phone activity history, but instead, it will answer automatically, allowing the person at the other end to listen to what is happening around the handset, until the moment when the phone user places or receives a call; in that case, in fact, secret listening will be automatically be interrupted and the spy phone will turn into a normal mobile.

It is also possible to use the environmental listening mode when the mobile phone is turned off! In fact, it is exactly in these moments that those who fear that they are being bugged feel secure, believing that they are really safe from prying ears. Instead, if they are using a spy telephone, this is the moment when their privacy is running the highest risk.

When the spy handset is turned off, all you have to do is call from the controlling number, and even though in theory it should not be possible to talk, the spy software will give green light to your call, without giving out any visible sign of activity, and of course arising no suspicion in the person under surveillance.

If you want to know more about how spy cellphones are working, we advise you to visit the Endoacustica site, and request support from our experts, who will certainly be able to find the right option for your needs.

How a Spy Phone works

gennaio 26, 2010 Technology No Commenti

Nokia Spy

For those who do not happen to be experts of surveillance technology, the term spy phone may bring to their mind stories from a movie, with complicated secret agent machinery used to follow their targets basically anywhere.

The truth is actually very different, as a spy cellphone, even after more than a glance, on the outside looks exactly like your everyday mobile handset; and even by going through all its functionalities and features, you would not be able to see its true colors. In fact, the surveillance activity is carried out by a spy software, installed in an absolutely invisible way inside your mobile phone’s processor.

Thanks to this software, a third party listener will be able to keep in constant touch with the user of the handset under surveillance, and the latter would not be able to figure it out in any way.

All his conversations, both incoming and outgoing, will be listened to, from any distance; any text message sent or received can be comfortably read right on your cellphone; you will be able to listen to the conversations and sounds taking place around the spy phone, simply by dialing its number, even while it is turned off; And for cellphone models equipped with GPS positioning system, you will also be able to know in real time the geographical coordinates of your subject’s position.

All these functions, thanks to its invisible software, are carried out in an equally discreet fashion, without giving out any sign of activity like a ringtone, the glowing of its screen, the sound of an incoming text message and so on, and without leaving any trace in the phone activity history, which also means that no unnecessary suspicion could be raised.

The person who is remotely monitoring the spy phone can send commands by SMS to enable or disable its features and functions, to receive an activity report, a list of calls placed and received, or a list of all text messages both incoming and outgoing. These SMS messages, written in a particular easy format, are intercepted by the spy software and read as operating instructions, therefore they are not displayed on the screen.

Furthermore, always by sending a text message, it is now possible to activate the new recording function, to save conversations or eavesdropped conversations. By doing this, you will be able to record any call through the spy software, and the relevant audio file can be later sent, with another command, directly on your cellphone or your mailbox, via GPRS, Bluetooth or e-mail.

Like that, you will be able to use any compromising conversation as evidence before a court of law, to solve a child custody litigation, or a divorce, or even as a support for law enforcement to gather evidence against criminals or suspects.

In a few words, inside your ordinary cellphone you can conceal a valuable tool for complete surveillance. For more information on spy phones and how they work, you can visit the Endoacustica website and request more info.

Your MiFi hotspot might reveal your whereabouts

gennaio 18, 2010 Technology No Commenti


MiFi cards, or hotspots, normally used to share your 3G Internet connection on a wireless network, are certainly a very useful device for those who need to be connected at any time, no matter where they are.

Unfortunately though, sharing your network connection, aside from providing a useful service to other Internet users, might be a very high risk operation as far as your security, and the privacy of your data, is concerned, as it may lead to sharing some information that should instead be kept strictly private.

For those who living in the United States and who use hotspots manufactured and marketed my big providers such as Verizon and Sprint, the risk lies in a flaw which has been identified by some hackers, and which might lead people with malicious intentions to get to know the GPS coordinates of your position, while you are sitting checking your email, completely unaware.

Of course, this kind of attack requires a certain technical knowledge, but the dangerous part is that it can take place without password or key authentication, while the user has no idea of what is going on right before his eyes. On top of that, it looks like it is possible to download system configuration information, including private information stored in a non encrypted way on your computer.

On the other side of the fence, law enforcement might effectively use this tool to pinpoint dangerous criminals thanks to their Internet connection, follow their movements, gather evidence on their whereabouts and track them down when necessary.

To cut a long story short, if you have something to hide, or if you fear that your private information might end up in the wrong hands, from now on be very careful when you are connected to a wireless network!

Augmented reality can make our driving safer

gennaio 18, 2010 Technology No Commenti

Just a couple of days ago we mentioned how usage of augmented reality can help you to repair your car or to carry out highly skilled tasks. Today we would like to demonstrate how this technology can make our roads safer, allowing car drivers to see vehicles or obstacles coming from behind a curve or a building.

This system, which is being developed by a group of researchers at Carnegie Mellon University, merges two video feeds shot by two different surveillance cameras into one feed, giving the illusion of being able to see through a wall thanks to its processor, which matches common points from the two cameras. By identifying these spots, the software changes the video perspective to make it compatible with the driver’s view.

The resulting feed would then be displayed on the car’s windscreen, giving the realistic impression of seeing through a wall. Images to create this impression would be picked up by a video processor which can capture feeds from security cameras that you can literally find on every street corner in our cities.

In the future, should its usage become common, it might even capture images from other cars driving nearby and using the same system, but of course, at the current stage, this is just a speculation, as development and planning of such a software carries along a wide range of obstacles to overcome before we can really see it mounted on our cars.

For now, we can only see this new augmented reality application, which has been presented at the ISMAR fair in Florida, in the demo that you can see in the video above. And who knows, maybe one day we will really be able to use it!


maggio: 2020
« Giu    


Newsletter Endoacustica Europe - ENGLISH


Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87

Text ADS

spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Find the exact vehicle position with the QUAD-TRACK tracking module

13 Apr 2018


Real time tracking of cars, motos, trucks, containers etc. Extremely resistant, waterproof/weatherproof device! Are you looking for a compact, efficient and professional GPS tracker to find a vehicle position? Well, in this case Quad Track is the best choice you can make. This brand-new quad band real-time locator system has indeed a higher gear than other similar devices on the market today. For example, it allows to follow the path …

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …