Skip to main content

Technology

Music headphones can interfere with heart devices

posted onNovember 10, 2008
by hitbsecnews

Have a pacemaker or an implanted defibrillator? Don't keep your iPod earbuds in your shirt pocket or draped around your neck - even when they're disconnected. A study finds that some headphones can interfere with heart devices if held very close to them.

They might even prevent a defibrillator from delivering a lifesaving shock, say doctors who tested them.

The brain-controlled laptop computer

posted onNovember 8, 2008
by hitbsecnews

A computer researcher has successfully built a computer system which can give people who are unable to speak or move the chance to communicate using the power of thought.

University of Portsmouth’s Paul Gnanayutham has devised s system which uses patients’ brain waves as well as eye and muscular movements to move a cursor on a computer .

Honda unveils wearable robotic walker

posted onNovember 8, 2008
by hitbsecnews

Imagine a bicycle seat connected by mechanical frames to a pair of shoes for an idea of how the new wearable assisted-walking gadget from Honda works. The experimental device, unveiled Friday, is designed to support bodyweight, reduce stress on the knees and help people get up steps and stay in crouching positions.

Honda envisions the device being used by workers at auto or other factories. It showed a video of Honda employees wearing the device and bending to peer underneath vehicles on an assembly line.

CNN debuts election-night 'hologram'

posted onNovember 7, 2008
by hitbsecnews

It was an election night like none other, in every sense of the phrase. In addition to the obvious -- the selection of the nation's first black president -- Tuesday night's coverage on CNN showcased groundbreaking technology.

"I want you to watch what we're about to do," CNN anchor Wolf Blitzer told viewers early in the evening's coverage, "because you've never seen anything like this on television." And he was right. Cue CNN political correspondent Jessica Yellin.

Has the internet killed the video star?

posted onNovember 6, 2008
by hitbsecnews

Tonight music channel MTV Europe is holding its glitzy annual awards ceremony in Liverpool. But 27 years after its inception, the 24-hour channel that turned music videos into an art form barely shows them any more. These days MTV is given over to celebrities and reality shows. Coupled with the fashion for live music programmes such as Later with Jools Holland and the death of Top of the Pops, the pop video has been exiled to the internet.

Technology in the next 100 years: the futurologist’s view

posted onNovember 6, 2008
by hitbsecnews

Futurologist Ian Pearson discussed technologies of the future to more than 200 IT, security and finance delegates on the Aurora cruise ship.

He spoke of IT security threats from smart bacteria, gadgets which are installed in the skin, the soaring of tax rates precipitating the emigration of graduates to low-tax economies, oil at 30 dollars a barrel, and the reversal of globalization.

BD+ busted - Blu-ray on Linux one step closer?

posted onNovember 4, 2008
by hitbsecnews

A small group of dedicated researchers over on the Doom9 forum have successfully defeated BD+, the Blu-ray copy-protection system. This was the copy-protection mechanism that Richard Doherty, a media analyst with Envisioneering Group, claimed wouldn’t likely be broken for 10 years.

Doing an M&A Opens a Can of Technology Worms

posted onOctober 23, 2008
by hitbsecnews

As the financial crisis persists and companies snap up their peers at discount prices, they might be getting more than they bargained for. That's because apart from the regulatory and financial issues, a merger or acquisition also involves a host of technology challenges.

Security Lock Uses Any USB Device Unique Serial Number for Identification

posted onOctober 23, 2008
by hitbsecnews

The hackers at Makers Local 256 have created a secure door lock that can use any USB device as a unique key, from a memory stick to a mouse to an iPod. The ingenious system doesn't require to store anything in memory, which of course could be replicated, because it uses the USB serial number in the chip itself. The authentication process is simple: