Skip to main content

Technology

Sesame seed-sized antenna increases WIFI speed by 200 times

posted onAugust 28, 2012
by l33tdawg

Researchers from A*STAR's Institute of Microelectronics (IME) have developed the first compact high performance silicon-based cavity-backed slot (CBS) antenna that operates at 135 GHz. The antenna demonstrated a 30 times stronger signal transmission over on-chip antennas at 135 GHz. At just 1.6mm x 1.2mm, approximately the size of a sesame seed, it is the smallest silicon-based CBS antenna reported to date for ready integration with active circuits.

How to spy on campaigns of competitors who use URL shorteners

posted onAugust 28, 2012
by l33tdawg

URL shorteners are such a wonderful thing: they not only make URLs shorter (obviously), but they also give away some juicy details from those who use them when pushing online campaigns. Services like bit.ly, goo.gl, and others, provide publicly-viewable statistics you can often gleen valuable insight from. In this post, I'm going not only dive into some great URL shortener research methods, but I'm also going to show you how to use Google to find some of these links from your competitors! Results will inevitably vary, but the methods should still prove useful, regardless.

Forrester report urges HTML5 adoption, says most browsers can support it

posted onAugust 8, 2012
by l33tdawg

A new report from market research company Forrester says that it’s time for companies to embrace the latest Web standards and start building richer Web experiences that take advantage of the capabilities that are supported by modern Web browsers. The report highlights changing trends in browser adoption and talks about how companies are taking advantage of new functionality.

A-GPS vulnerability could let hackers track your location, take over your phone

posted onAugust 1, 2012
by l33tdawg

As the global adoption of smartphones has reached impressive levels during the past couple of years or so (with absolutely no sign of stopping anytime soon), it is surely not surprising to see that hackers have turned their evil eye towards exploiting the various weaknesses of your favorite mobile device. But although in the past we’ve talked how hackers exploit various soft spots in the OS, it turns out that attackers can actually use underlying technologies to get access to private information.