Smartwatch Makers Finally Design Devices for Women
Despite a wide selection of smartwatches for men, smaller, fashionable versions designed for women have only recently become available—and their choices are limited
Despite a wide selection of smartwatches for men, smaller, fashionable versions designed for women have only recently become available—and their choices are limited
Teenaged boys who spend too many hours in front of the computer or television without participating in enough weight-bearing exercise could develop weaker bones as they age, a small study suggests...
Background app updates, cell tower pings and other hidden activity accounts for almost half the battery drain on Android phones. Christopher Intagliata reports
State and local law enforcement agencies across the U.S. are setting up fake cell towers to gather mobile data, but few will admit it
Wireless companies want next-generation gadgets to download at rates of gigabits per second. The question is how to make it happen
The race to make a medical diagnostic device inspired by Star Trek enters the final stage this month, as consumers put competing designs to the test
Building on advances in object recognition, machine translation and neural networks, scientists have developed software that converts pictures into sentences
If you find yourself being chased by a crazed bipedal robot, simply enter a room and close the door behind you
How four tech companies tried to fight feature bloat—to greater and lesser success
Citizen scientists help software developers detect flaws that make their programs vulnerable to hackers
Software and hardware companies push new, feature-bloated versions on us every year. Why do we keep buying?
A detailed look at why computers running the U.S. electrical infrastructure are so vulnerable to digital threats
The winning team's robot, a humanoid design that could transform into a wheeled kneeling position, finished all eight tasks in less than 45 minutes...
The spy agency’s warrantless surveillance program on U.S. soil has been expanded to search for signs of hacking, according to the latest classified document leaks from former contractor Edward Snowden...
We all emit slightly different brain waves in response to stimuli, and researchers say that an individual’s specific "brainprints" could be used to validate our identities...
What is a virtual machine and how can you use it to boost your computer efficiency? Tech Talker explains
What could you possibly have in common with a mushroom, or a dinosaur, or even a bacterium? More than you might think.
Connections to a robotic arm have been wired into a tetraplegic person's brain and enabled him to use his thoughts to execute tasks requiring smooth motor control
An Estonia-based cybersecurity firm adopts a “blockchain” public ledger system to verify online transfers of sensitive information
You have free articles left.
Support our award-winning coverage of advances in science & technology.
Already a subscriber? Sign in.