Facebook Aquila, an unmanned aircraft designed to stay aloft for 90 days and deliver the Internet to a 60-mile radius, completed its first successful flight.
Tascent M6, which can be used for iris scanning, voice, facial recognition or fingerprints, has been used in several applications around the world.
Giving back to the open-source community has helped speed development, including infrastructure resources, such as servers and networking appliances.
South Africa-based company is providing the backbone data collection and analytics to create most of the data points that are coming out of the 21-stage event.
Most people check email 96 times a day, though only 10 percent of emails require action. Hiri believes there's a better and more effective way.
This will be a timely eWEEKchat conversation about the important use of new-gen technology in the health care sector. Please join us.
Google DeepMind is teaming with Moorfields Eye Hospital in an effort to use artificial intelligence to more effectively detect and prevent rising ocular diseases.
Moodstocks' software uses machine learning to make searchable various images in video from smartphones and tablets.
NEWS ANALYSIS: Laws governing the Clinton email case are not unlike standards in general, which always run years behind the innovation in IT. And that's an issue.
Amazon Web Services, Appriss, Esri, MasterCard and RTI International will be among the first to supply goods and services to the initiative.
TechHire partnerships expand access to learning options that provide a quick path to good jobs, such as 'bootcamp'-style programs, online options and competency-based programs.
At the Stanford summit, the president used the occasion to talk about his commitment to building bridges between nations to tackle cultural challenges.
NEWS ANALYSIS: New-gen IT carried on the business of government information distribution when conventional methods failed, and the government had nothing to do with it.
Disaster recovery-as-a-service provider now has banked $130 million in venture capital funding over five years in an increasingly hot market.
We've known for a long while that passwords, firewalls and private networks simply aren't sufficient for tight IT security anymore. It's all too easy for even a semi-sophisticated cyber-criminal to scan for passwords and find back doors into personal and business data that, sooner or later, amount to illicit money in the thief's bank account. Thus, the race is on to develop workable alternatives, with behavioral biometrics one of the more promising ones. Behavioral biometrics is an additional layer of security that provides seamless, continuous user authentication. It works by collecting and evaluating a mix of behavior patterns, such as the way we move our hand on a mobile device screen or with a mouse, to create advanced behavioral algorithms to establish a user's profile. The next time that person uses the service, the technology will rate current interactions against his or her profile and provide a recommended action to allow, challenge or block access to the account. These patterns are monitored and analyzed continuously—and frictionlessly, in the background—to provide continuous account protection. What makes behavioral biometrics so intriguing is that it's virtually impossible to imitate another person's behavior precisely, unlike static biometrics (fingerprint, retina, etc.), which can be stolen and reused. For this slide show, eWEEK worked with Radiant Insights, Verizon and TeleSign, a mobile identity software developer, to come up with key data points on this topic.