Save. Share. Connect.
Monday, June 27, 2016
VOLUME - NUMBER
Daily News Archive
Front Page Articles
People in the News
Electronic Mfg. Services
Electronic Mfg. Products
HOME / CURRENT ISSUE
Computing Threads and Sewing Circuits
By Mike Skinner
In what appears to be a milestone for the wearable electronics market, researchers at the Ohio State University (OSU) have developed a process of embroidering circuits into clothing with 0.1mm (0.004 in.) precision. This level of accuracy now makes wearable circuitry, clothes that gather ...
Video Recording Becomes Real: Stand up and Cheer
By Walter Salm
Ray Dolby is perhaps best known for his revolutionary audio noise-suppression system — a technology that dramatically lowered the background hissing noise that was an unavoidable part of every tape recording. Then a related noise suppression system was developed for FM broadcast stations and for ...
5D Data Storage Could Record the History of Humankind
By Glenn Harris, University of Southampton
Scientists at the University of Southampton have made a major step forward in the development of digital storage, which is capable of surviving for
billions of years
. Using nanostructured glass, a team of scientists from the university's Optoelectronics Research Centre (ORC ...
Demand for Quantum Dots to Increase 20-Fold Over Next Decade
Quantum dots (QDs), synthesized miniature semiconductor crystals, are teetering on the edge of mass adoption. From a shaky entrance in bioscience in the early 1990s to a growing popularity in consumer electronics and manufacturing, the time may finally be right for the quantum dot.
From "Made in China" to "Made in the Cloud"
By Mitch Free, CEO, CloudDDM
Additive manufacturing, commonly referred to as 3D printing, has moved beyond being simply a great technology for rapidly producing prototypes; it has now become a viable manufacturing option. Additive manufacturing is impacting supply chains in the way companies design and bring products to market ...
Time Synchronization Using Distributed Data Acquisition
By Stew Thompson, Marketing Specialist, CAS DataLoggers
When the time between a PC and Delphin data logger differs by a significant duration, measurement data cannot be displayed in the form of online trend diagrams as it normally can. Therefore it is essential to ensure time synchronization between the data logger and the PC. Here, we look at four ways ...
The 7 Deadly Sins of Incident Response
By Brandon Tansey, Security Research Engineer, Lancope
The seemingly endless barrage of attacks on government and enterprise networks has made it clear that organizations need to be much more proactive when it comes to security. Deploying perimeter defenses like firewalls and antivirus, and expecting them to keep attackers off of your network, has become ...
Photovoltaic Power Is Coming to the French Island of Corsica
By Michael Lippert
Photovoltaic power is natural and can be cost-effective. And photovoltaic power through lithium batteries is coming to the French island of Corsica. Two PV power-generating plants with lithium battery power storage will be installed on Corsica and be made part of the Corsican operating power grid ...
Practical Fusion Energy Targeted at Sandia and Rochester LLE
Albuquerque, NM — A two-year, $3.8 million award has been received by Sandia National Laboratories and the University of Rochester's Laboratory for Laser Energetics (LLE) to hasten the day of low-cost, high-yield fusion reactions for energy purposes.
JTAG/Boundary Scan: Updated Standards
Peter van den Eijnden, JTAG Technologies (
Prompted by a change in device packaging — from through-hole to surface-mount-technology (SMT) packaging — that occurred almost 30 years ago, a group of like-minded test engineers met to consider the impact that these modified packaged parts would have on testing their forthcoming assemblies ...
The Passive Optical LAN: Providing Enterprises Mega Improvements in Network Performance and Flexibility
By Ed Sullivan
Enterprise networks around the world are becoming progressively choked by the integration of bandwidth-hungry Internet-based applications. The growing usage of streaming video content, integration of digital voice services into the LAN, video conferencing and other online activities ...
Top Seven Targets for Cyber Criminals
By Arkady Bukh, Esq, New York, NY
Traveling business executives represent the latest group being targeted by cyber attacks and hackers, according to a new report from Kaspersky Lab (www.kaspersky.com). The report details such instances as hotel guests in Japan and the United States being tricked into downloading software that is malicious ...
Anyone for Surface Noise?
By Walter Salm
Back in the middle 1960s, there was a lot of talk about creating digital audio. At the time, there were at least three major roadblocks to making this happen: appropriate media, hardware, and basic knowledge. The only digital media that worked was high-speed magnetic tape. There was ...
How Far We've Come!
By Jacob Fattal
It was 30 years ago that
first appeared as
, a 12-page tabloid on newsprint with ink that came off on your hands. The paper concentrated on publicizing companies in the Mid-Atlantic region. The paper grew each month, by dint of hard work ...
Powering the Internet of Things: New Technologies for New Markets
The Internet-of-Things (IoT), a proliferation of interconnected sensors and processors, is arguably the most disruptive shift in Internet technology since the origination of the Internet itself. The IoT represents a complex universe spanning communications, identification, location tracking, and security, enabled ...
Robots Are Unlikely to Hurt Employment Opportunities
By Steve Tally, Purdue University, West Lafayette, IN
Advances in artificial intelligence (AI) and robotics imply that machines will soon be performing many of the tasks currently handled by human workers. These tasks will not just be blue-collar jobs in manufacturing, but white-collar jobs as well, such as lawyers, doctors, and even journalists. According ...
Bad USB — Can Be a Disaster in Your Pocket
By Andy Greenberg
Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB ...
Taking Printing to the Next Dimension
By Steve Morkovsky, Risk Control Technology Specialist, One Beacon Technology Insurance
Three-dimensional printing makes it as cheap to create single items as it is to produce thousands and thus undermines economies of scale. It may have as profound an impact on the world as the coming of the factory did. Just as nobody could have predicted the impact of the steam engine in 1750 or the ...
Material Trends for BIPV Glass
By Robert Nolan
In order to move beyond a niche product, building-integrated photovoltaics (BIPV) will need to demonstrate both improved efficiency and lower cost. NanoMarkets believes that BIPV should be able to benefit from the growth that we expect to see in the PV market as a whole, but the degree to which it ...
Taking The Next Step Towards Online Security
By Dave Rizzo
Online banking and business invites millions of customers and creates the associated need for protection against cyber attacks and online criminal activity. The Risk Based Security and Open Security Foundation reported a record number of 2,644 breaches in 2012 where 70 percent was due to external ...
© 2015 USTECH. All Rights Reserved. |
Contact Us: 610-783-6100 | firstname.lastname@example.org
powered by GIM