Computer Sciences

A new AI-based tool to detect DDoS attacks

Cybercriminals are coming up with increasingly savvy ways to disrupt online services, access sensitive data or crash internet user's devices. A cyber-attack that has become very common over the past decades is the so-called ...

Software

Extreme reality telemetry for first responders

Imagine a limited visibility scenario: Smoke fills the air, making it difficult to see more than a few feet in front of you. The roar of the flames is deafening, and you can feel the heat of the fire on your skin even through ...

Business

Telecom firms aim to shrug off slump at annual get-together

Telecom companies will aim to put a positive spin on their current slump in fortunes when they gather in the Spanish city of Barcelona on Monday for the annual Mobile World Congress (MWC), the biggest event in the industry's ...

Engineering

Simultaneous electricity generation and filtration of wastewater

The purification of various water resources, such as rain, seawater, groundwater, river water, sewage, and wastewater, into potable or usable water is a high-energy process. But what if electricity could be generated during ...

Consumer & Gadgets

Core collection: Apple archive goes under the hammer

A collection of nearly half-a-century's worth of Apple computers that traces the evolution of one of the world's most influential companies is going under the hammer in California next month.

page 23 from 40