close
IoT in healthcare

Telemedicine Ophthalmologist In Theni, Patient In Aandipatti

JULY 2010: Farveen lives in a remote area of Andhra Pradesh’s Kurnool district. When a scorpion bit her friend last year, she was clueless about the first aid required. She immediately...

Cryptography Mechanisms For access Control in Wireless Sensor Networks

Security allows wireless sensor networks (WSNs) to be used with confidence. Without security, the use of WSN in any application domain would result in undesirable consequences. The basic idea of a WSN...

10 Emerging Technologies To Track In 2010

Energy harvesting You would have heard this several times already – “We have just one earth; we better take good care of her!” This slogan is becoming louder as the use of...

Will Tomorrow Be Lit By LEDs?

  APRIL 2010: Do you remember the HP-35 calculator that Hewlett-Packard (HP) launched way back in 1972? It was a hot favourite amongst engineers, being the only pocket calculator with transcendental functions...

The Third Dimension

JUNE 2012: A standard TV set displays images and video in two dimensions (2D). It lacks the depth that forms the third dimension of viewing. In real life, when you view an...

Some Techniques Used for the Third Dimension

The nature has provided us with such a beautiful optical system that it has no match so far. Our eyes with which we see the world individually form two-dimensional (2D) pictures...

Aerial Eye to Guard Against Terrorism

JULY 2010: The thought of terrorist attacks in Mumbai on Nov. 26, 2008 still sends chills down our spines. Be it the attack on a city that never sleeps or the...

TveeBoX Allows Computing And Communications On TV

  AUGUST 2010: Matrimony between the television and the Internet—that is what TveeBoX, an over-the-top set-top box (OTT STB) developed by Bengaluru-based NextBiT Computing, has achieved. Watching movies from your USB, browsing...

Video Surveillance System That Never Sleeps

  “One is not exposed to danger who, even when in safety is always on their guard.” —Publilius Syrus (Roman author, 1st century B.C.) With statistics related to crime and security breaches being on...

Buddy Player For Visually Challenged

MAY 2011: At a conference, the CEO of a product design company noticed nothing peculiar—attendees discussed issues and took notes on their laptops. It was only after the meeting that he...

Popular Articles