23/10/2019

Computer Sciences

How voice assistants follow inaudible commands

An attack against speech recognition systems with manipulated audio files used to work only via a data interface. Now, all it takes is playing the secret messages via loudspeakers.

Internet

Algorithm can help boost the popularity of social media posts

Computer scientists created a new algorithm to recommend tags for social media posts which should boost the popularity of the post in question. This algorithm takes into account more kinds of information than previous algorithms ...

Security

New tool determines threats to networked 3-D printers

In the rising era of industrial Internet of Things (IoT) devices, factories are being upgraded. Devices, such as networked 3-D printers, can now interact with other machines and be controlled remotely to improve efficiency. ...

Telecom

When WiFi is weak, send noise instead

When WiFi was designed, it was intended for high-speed data communications. The Institute of Electrical and Electronics Engineers (IEEE) set the standards for communications—that's the 802.11 protocol, a familiar number ...

Robotics

AR platform for improving the efficiency of automated tasks

When Tesla failed to hit weekly production targets in the first quarter of 2018, chief executive Elon Musk blamed it on "excessive automation." The robots were slowing things down and "underrated" humans could do better.

Telecom

Extending Wi-Fi range for smart home devices

A group of researchers led by a BYU computer engineering professor has created a protocol that significantly extends the distance a Wi-Fi-enabled device can send and receive signals.

Security

Microsoft and partners toughen firmware defense

For many people who are not tech professionals, the word "firmware" first appears to them in the negative. News items over the past years have used the word over and over again to report attacks. What is firmware? If software ...

page 3 from 4