Computing & information processing

Computing & information processing

The days of the old jail visitation rooms and conversations through a glass window will be no more. The Sedgwick County Jail will transition the visitation...

A new mobile and Web app, called SoftStory, maps and highlights seismically vulnerable housing. It’s been said the greatest dangers are the ones unseen. The...

Forty years ago, a group of researchers with military money set out to test the wacky idea of making computers talk to one another...

Articles and issues discussed in this week’s report: Chinese hacker indicted Flying cameras assist first responders in latest China earthquake Missouri police militarization Car safety: collision prevention system...

U.S. Customs and Border Protection (CBP) has announced the launch of the first authorized app to expedite a traveler’s entry process into the U.S. Mobile...

Veritas Scientific, based in Virginia, markets a truth detection system called HandShake for soldiers to diagnose the trust-worthiness of people they may have to...

Residents of the Israeli kibbutz Mishmarot have seen many break-ins recently, like many of the towns in the region. Most homes have alarm systems...

Researchers at Carnegie Mellon University have developed a method for tracking the locations of multiple individuals in complex, indoor settings using a network of...

 The Israeli company HTS, specializing in computerized reading solutions for identification of vehicles and containers, with a variety of solutions for sea ports automation...

Good Technologies unveiled a security system for mobile devices. Gartner declared recently that “MDM is dead” – is this really the situation on the market?...

On February 25, 2013, a 26-year-old Syrian "hacktivist" who had fled Damascus was sitting up late in his apartment in a Washington suburb watching...

On the heels of a delivery to the Royal Netherlands Air Force, Environmental Tectonics Corp. has signed a contract for an additional disaster-management simulation...

The global yearly survey of cyber threats performed by “Cyber Arc”: 80% of senior managers consider cyber attacks as a greater national threat than...

The U.K. is testing a new simulator while investigating techniques to improve the accuracy of its sailors using machine guns on naval and auxiliary...

U.S. law enforcement officials are demanding the creation of a “kill switch” that would render smartphones inoperable after they are stolen, New York’s top...

RSA introduced the next generation of its Silver Tail web threat detection solution, with the ability to quickly separate the activities of friend from...

 On a daily basis NetApp proves that the findings of a survey conducted last year are even more valid, that fast, available data is...

Crowd control, a practical skill regularly taught to members of the military and police, is periodically brought to the forefront during clashes such as...

The definitions may vary but they all say one thing - what is the trick of extracting useful, real time data from the super...

 The rapid growth in video capturing, recording and transmission in recent years, has brought a new era, in which almost every corner of our...

The evolving capability to turn 'Big Data' into intelligence in timely and methodical processes enable governments, law enforcement and intelligence agencies to tap new...

National intelligence services, acting in the service of homeland defense, collect information from a huge variety of collection sources: sensors, video recordings, listening-in, manned...