Home Search
robot - search results
If you're not happy with the results, please do another search
New Research Reveals Deep Confusion About Artificial Intelligence
India – April 7, 2017 – A new global study released by Pegasystems Inc. (NASDAQ: PEGA), the software company empowering customer engagement at the...
12V Battery Charger-cum-Variable Power Supply
The 12v battery charger-cum-variable power supply circuit presented here can charge a 12V lead-acid battery of 50Ah to 80Ah (even up to 100Ah) capacity...
Advances In Motors And Drivers For Wearables
Ever wondered how your mobile vibrates? Let us see. There is a small motor in your phone, which is responsible for shaking it every...
Major Technology Trends and Challenges in 2017
Driven by the consumer mindset of ‘everything on demand’, innovation is ongoing
for tech-driven companies. For the wellbeing of the human race, however,
technology...
Extending The Mobile Network For The IoT
With several billion devices expected to be connected to the Internet of Things (IoT) over the next few years, character of the mobile network...
Top 19 Arduino Projects To Build In Your Free Time
We compiled a list of 19 Arduino projects that would be cool to design. If you have an Arduino lying around or are planning...
Development Boards DIY and Hobbyists Application
There is no dearth of electronic hobbyists around the globe. There are many expert hobbyists working beyond the scope of imagination, increasing the demand...
Selecting An Electric Motor And Drive System
Electric motors and drives are important components of industrial automation. Their selection therefore is an important step in the process of building an automated...
The Blue Brain Project: Unraveling The Brain’s Mystery
The human brain is the most remarkable creation of God and also the reason behind human intelligence. Blue Brain is the name of the...
Security For IIoT And IIoE: Implementation Starts From The Chip Level
Security in an Industrial IoT (IIoT) has been found to have become an over-rated aspect of late. Almost every service provider implements security at...