Mobile

Top Stories

60GHz technology opens door to WiGig® and 5G applications Imec ™s prototype small, low power 60GHz transceiver with beamforming offered to growing communication markets. read more

Broadcom proposes to acquire Qualcomm Broadcom Limited (NASDAQ: AVGO) ( œBroadcom ), a semiconductor device supplier to the wired, wireless, enterprise storage, and industrial end markets, today announced a... read more

Drone Registration and Remote ID Here ™s why the establishment of a robust identity management solution for UAS can ™t be left ˜up in the air. ™With the drone market expecting exponential growth over the ne... read more

All the Signs are Here for Interactive Retail Shopping has changed so dramatically in the last 20 years that you don ™t even have to go into a store these days. Digital technology is further transforming the sh... read more



News & Analysis

  • Drone Registration and Remote ID

    10/27/17  Here’s why the establishment of a robust identity management solution for UAS can’t be left ‘up in the air.’ With the drone market expecting exponential growth over the next few years and a large number of anticipated users, an Unmanned...

  • All the Signs are Here for Interactive Retail

    10/11/17  Shopping has changed so dramatically in the last 20 years that you don’t even have to go into a store these days. Digital technology is further transforming the shopping experience, using networks and big data analytics to smooth the process...

  • Security Principles for IoT Devices Using Arm TrustZone Security Extension

    10/06/17  Examining four “must do’s” for tackling the complex challenges IoT device security poses. The Internet of Things (IoT) market is expected to enable and deploy around 50 billion connected devices by 2020. These IoT devices will be deployed...

  • As Embedded Vision Takes Off, Software Frameworks Bear Watching

    10/05/17  Careful consideration of the software framework requirements for embedded vision applications for AR/VR; surveillance cameras, self-driving cars, drones, mobile phones, and more is key. Deep learning techniques such as convolutional neural...

  • How Secure is Android?

    10/05/17  Google anti-malware measures have treats opposing tricks. Android is used in over 1.4 billion devices today. Android versions are named after treats in alphabetical order. The treat code names began with release C for “Cupcake,”...

  • A VR Standard to Connect Them All

    09/28/17  Determining how VR Source devices connect and interoperate with HMDs can avoid confusion and cut costs. Anyone who remembers working with computers before USB will know what chaos it can be when connectors are not standardized. It makes things...

  • New Bridging Capabilities Address Needs of Mobile-Influenced Markets

    09/28/17  Advances simplify integration of legacy, mobile components A couple decades ago when embedded designers wanted to reduce cost, they turned to the high-volume architecture of their day—the PC. By moving to hardware and software originally...

  • Digital Signage Designers Push the Boundaries Outside the Box

    09/28/17  Engaging customers via digital signage has come a long way, but the technology breakthroughs for this sector may just be getting started. Digital signage has certainly come of age recently, but if new technologies are any indication, the best...

  • TrustZone Basics

    09/28/17  What are the factors that lend an IoT security tool its prowess? Most would agree that IoT devices need to be secure or they can easily become a Distributed Denial of Service (DDoS) nuisance at best, or at worst, a gateway to hacking on an...

  • Increasing Slot Action with Immersive, Graphics-Rich Multi-Screen Games

    09/28/17  Options for increasing game development ease, cost effectiveness, and flexibility, even as gaming evolves at a white-hot pace. Walk into a casino today and you will see the growing presence of graphically-intensive digital games designed to...

  • The Physics of Analog Cybersecurity

    09/28/17  Are MEMS sensors inherently trustworthy? Successful acoustic injection attacks indicate otherwise: Hacking an accelerometer to output a waveform that spells “WALNUT” with an upper limit of 10 G. As the Internet of Things (IoT) grows exponentially,...

  • Mobile VR: Worth it?

    09/13/17  VR thrills depend on how well your smartphone chills. The Samsung Gear and Google Daydream View are just two of the many mobile VR headsets out there that work with several smartphones to produce a decent VR experience. The phone needs a 4K...


Tech Videos

©2017 Extension Media. All Rights Reserved. PRIVACY POLICY | TERMS AND CONDITIONS