Software news

Software

Book explores conceptual clarity and a new theory of software design

Sometimes, software is just like us. It can be bloated, slow, and messy. Humans might see a doctor if these symptoms persist (maybe not for messiness), but rarely do we push a flawed software program to go see its developer ...

Software

New software allows industrial robots to achieve touch sensitivity and precision close to human hands

Eureka Robotics, a tech spin-off from Nanyang Technological University, Singapore (NTU Singapore), has developed a technology, called Dynamis, that makes industrial robots nimbler and almost as sensitive as human hands, able ...

Software

A new program models airflows much faster than before, without a supercomputer

Modeling reveals that even rooms with efficient ventilation often have areas where the air is stagnant. Assistant Professor Ville Vuorinen believes that a new program could become a tool that can be used by both researchers ...

Software

Innovative software modules for effective excess thermal energy recovery

After nearly two years of data collection and software development, EU-funded project, EMB3Rs, is almost ready to reveal the best ways that industry can re-use excess thermal energy.

Software

Battling wildfires from behind the scenes

Catastrophic wildfires in Europe have become a far too common headline and this year has been no exception as the world once again bore witness to parts of the continent burning. While southern Europe is no stranger to the ...

Software

Researchers develop interface for underwater robotic equipment

A research team from the Interactive and Robotic Systems Laboratory at the Universitat Jaume I in Castelló has developed software that allows underwater robots with manipulation capabilities to be controlled remotely in ...

Software

Apps for popular smart home devices contain security flaws

New cybersecurity research from Florida Tech has found that the smartphone companion applications of 16 popular smart home devices contain "critical cryptographic flaws" that could allow attackers to intercept and modify ...