A New Market for the IoT: “Bionic Man”

Bionics covers all the scientific knowledge and technologies dealing with  plants and animals that could achieve biological applications related to health and the lengthening of the human lifespan. Bionics studies the properties of living cells [...]

Gemalto to Help Norway’s Postal Agency Implement Fraud Protection Tech

Norway’s national post and logistics service has selected digital security company  Gemalto to provide a verification tool for the agency to check customer credentials. Gemalto said Thursday it will supply its Coesys ID Verification technology to Posten Norge in order [...]

City Identity cards are used more frequently in the United States

For the last ten years, a dozen US cities have set up services using ID cards and fifteen others are preparing to follow this example. It appears that poor people and immigrants living illegally in [...]

Internet security in Q2 2016

According to Akamai, the total number of DDoS (Distributed Denial of Service attack or distributed denial of service) has increased by 129% between Q2 2015 and Q2 2016. The DDOS attack aims to make unavailable [...]

The Spy Who Controls The Frozen Food

At the recent event organized by IFA (Internationale Funkausstellung) in Berlin, manufacturers have competed to show a picture of what the future might bring. As part of the smart kitchen, Smarter, a British company proposes [...]

How to succeed in a Website Implementation and Design

Sorry ! No English translation available for the book written in French by J-M Hardy and Leo J. Lesage « 60 règles d’or pour réussir son site web ».

Improvement of the manufacturing process of silicon-on insulator (FD-SOI) over 12 nm

After 22 nm launched in 2015, the chipmaker Globalfoundries launches the actual manufacturing FD-SOI 12nm components process, which will be available from 2019 for the Internet of Things and 5G. The FD-SOI technology was developed [...]

Identity Checking in Xinjiang

Xinjiang (Sinkiang) or East Turkestan, is one of five autonomous regions of China. Enjoying special status, the country is the sixth of Chinese territory, the equivalent of three times the area of France. It has [...]

Ethics for portable medical devices

The entrance of portable electronics in the medical field is raising different problems and challenges the traditional standards. The mobile phone is now much more widespread than in the past and its computer processing power [...]

Strong Growth for “Diameter Signaling” with LTE Uptake

“Diameter” is a signaling protocol defined by RFC 3588 standard as part of the AAA protocols which are performing three functions: authentication, authorization and accounting / Auditing. This is the Diameter protocol, which, at the [...]

Bitcoins stolen

Hackers have stolen 120,000 bitcoins (65 million US dollars) to Bitfiness, the third principal place of Bitcoins exchange. Immediately, the bitcoin rate fell more than 20% in a week, which resulted in a sharp decline [...]

Cyber attacks on bank networks

Reuters reminds that the global network of financial messaging SWIFT suffered last June a series of hacker attacks on its subsidiaries, particularly those from Bangladesh. According to the company eSentire, threat detection service provider and [...]

Jordan adopts the secure biometric ID card

NXP Semiconductors N.V. today announced that The Civil Status and Passports Department (CSPD) in Jordan has chosen NXP’s secure SmartMX2 microcontroller for its new contactless citizen ID card. The Ministry of Information and Communications Technology [...]

The Challenge of the 5G’s Marathon

A triple competition (technical, economic and political) is open between Europe, Asia and North America on the implementation plan of the “5G”. Who will be the most technically astute and will be the most able [...]

More Than Half of Mobile Requests are Now IPv6 based

A mobile IPv6 network milestone was passed last week as Facebook and Akamai reported that more than half the requests from the four largest U.S. mobile networks were IPv6-based. IPv6 was used in around 70 [...]

Biometric Tech and Mobile Virtual Credentials

Electronic passports will peak by 2022, only to be replaced by virtual credentials, according to a new report from Acuity Market Intelligence. That same trend applies to all smart, biometric credentials including national ID cards [...]

The “Brexit” and the Internet of Things

Britain’s exit from the European Union is creating massive uncertainty for the U.K. economy. Technology companies, including IoT actors, face potential challenges in their markets, their funding and their workforce, but perhaps also opening new [...]

What category of biometrics for secure payments?

According to a study conducted for Visa in seven European countries, the majority of respondents believes that the two-factor authentication, that is to say the combination of biometrics to a payment tool (support possessed by [...]

The IoT-Car, a car without steering wheel and without pedals

The achievements of the IoT materialize faster than schedule. Why one should still pass the driving license control, as the autonomous car without steering wheel or pedals, will soon be available? In fact, the competition [...]

IoT and Gastronomy: The Internet of Things will monitor the growth of oysters

Global warming is responsible for a number of threats in particular on the production and trade of shellfish. In recent years, the shellfish industry and crustaceans in the Washington State lost almost $ 270 million [...]

Electronic medicine or medical electronics?

According to research firm “Lux Research” study, “smart pills” and patches connected could save nearly $ 300 billion on health care in the United States, through better adherence to recommended treatments. Lux Research noted that [...]

500 million mobile subscribers in Africa

According to a study published by the Association of mobile professionals, the GSMA, Africa now comprises more than half a billion of subscribers to mobile services. The mobile connectivity is actually associated with essential services [...]

Are we heading towards a slowdown in demand for digital?

Saturated by offers from the Web, citizens seem somewhat reducing their consumption of digital applications. The average download speed is now close to 50 Mbs in the United States and 29 Mbs in the UK. [...]

Google wants to facilitate your password management

Google proposes to generalize the use of a password manager. The first step in preparation with Dashlane, concerns connections to Android applications, then the second would involve other devices and operating systems. Thus, we would [...]

Samsung and Nestle on a common road for a quantified-self health platform

One of the most significant advances of the Internet of Things is dealing with the health sector. Samsung Electronics and the Institute of Nestlé Health Science have understood the synergy that could arise from the [...]

The theme of the Afghan identity card becomes divisive

The Afghan government would issue biometric identity cards for all citizens in order to limit electoral fraud and strengthen national unity. But the question of whether to include the ethnicity of citizens unfortunately highlighted the [...]

Fraud and insecurity in mobile communications

The specialized Working Group on Fraud and insecurity of the GSM Association (FASG) was created to study the problems related to technology GSM networks, with the objective of increasing the level of protection. FASG provides [...]

AMS sells NFC RFID readers to ST

Austrian industrial AMS recently expanded its sensor manufacturer position through the purchase of Cambridge CMOS Sensors (CCMOSS) and MAZeT. Now, while retaining certain wireless products and IP to the next generation of sensors, AMS has [...]

Egyptian Parliament Controversy over Identity Cards

The Egyptian Parliament discussed a bill on citizenship, introduced by MP Alaa Abdel Moneim on the abolition on the ID card, of the statement relating to the religion of the holder. The Egyptian Parliament seems [...]

“Enemy ears are listening to you !!”

In order to fight against the “Fifth Column” (a supposed hidden spy organization), the French Minister of War Alexandre Millerand had post in 1915, signs proclaiming “Shut up! Beware! Enemy ears are listening to you. [...]

Articles précédents

© 2015 Strategies Telecoms & Multimedia | Contact |  -