A Flexible, Transparent Lithium-ion Battery

Stanford scientists used a grid-structured electrode, which is fabricated by a microfluidics-assisted method, such that the feature dimension in the electrode is below the resolution limit of human eyes, and, thus, the electrode appears transparent. By aligning multiple electrodes together, the amount of energy stored increases readily without sacrificing the transparency. In addition, the battery Read more about A Flexible, Transparent Lithium-ion Battery[…]

An Analysis of Anonymity in the Bitcoin System: Bitcoin is not Anonymous

Bitcoin is not inherently anonymous. It may be possible to conduct transactions is such a way so as to obscure your identity, but, in many cases, users and their transactions can be identified. We have performed an analysis of anonymity in the Bitcoin system and published our results in a preprint on arXiv. via An Read more about An Analysis of Anonymity in the Bitcoin System: Bitcoin is not Anonymous[…]

Charlie Miller Finds Way to Hack MacBook Battery | News | The Mac Observer

Security researcher Charlie Miller has announced that he has found a way to hack the chips that control the batteries in Apple’s MacBook, MacBook Pro, and MacBook Air. Using these chips, he was able to brick (or ruin) batteries, or even install persistent malware that would survive a physical hard drive change. via Charlie Miller Read more about Charlie Miller Finds Way to Hack MacBook Battery | News | The Mac Observer[…]

NMM multimedia middleware

Motama’s key technology – called Network-Integrated Multimedia Middleware (NMM) – provides a ground-breaking new software solution for networked multimedia systems, spanning from embedded and mobile devices, to PCs, to large-scale computing clusters. NMM is available as commercial or Open Source version. Our middleware forms the basis of our own products and is licensed to world Read more about NMM multimedia middleware[…]

Maxivista Multi Monitor – Dual Monitor – KVM switch

MaxiVista turns any spare Desktop, Laptop or Netbook PC into a second monitor for your primary computer. No extra multi monitor hardware is required. Simply extend program windows across multiple screens as if it were one big monitor. Increase your productivity by using a multiple monitor software. via Multi Monitor – Dual Monitor – KVM Read more about Maxivista Multi Monitor – Dual Monitor – KVM switch[…]

KPN goes back to stone age of internet, charges mobiles per MB

This should cost them a lot of customers. People will probably change to other providers which do offer them unlimited mobile internet for a reasonable price. This comes as a response to the Dutch parliament not allowing mobile internet providers to cut off certain services, such as whatsapp, viber and skype from mobile internet. KPN Read more about KPN goes back to stone age of internet, charges mobiles per MB[…]

Ultimate Stunts – A free racing game

Ultimate Stunts: Not just another racing gameUltimate Stunts is a remake of the famous DOS-game stunts. Racing in Ultimate Stunts involves some really spectacular stunts, like loopings, corkscrews, bridges to jump over, etc., but the best thing is that you can design your own tracks! The game Ultimate Stunts is not yet finished, but it Read more about Ultimate Stunts – A free racing game[…]

First Demonstration of Time Cloaking

Time cloaking is possible because of a kind of duality between space and time in electromagnetic theory. In particular, the diffraction of a beam of light in space is mathematically equivalent to the temporal propagation of light through a dispersive medium. In other words, diffraction and dispersion are symmetric in spacetime. That immediately leads to Read more about First Demonstration of Time Cloaking[…]

EU court determines that intermediary is responsible for authenticity of goods sold on site

Het Hof geeft preciseringen over de aansprakelijkheid van ondernemingen die op internet een elektronische marktplaats beheren voor de door hun gebruikers gepleegde merkinbreuken De nationale rechter moet deze ondernemingen kunnen gelasten om niet alleen maatregelen te nemen om de inbreuken op de intellectuele-eigendomsrechten te doen eindigen, maar ook om nieuwe inbreuken van die aard te Read more about EU court determines that intermediary is responsible for authenticity of goods sold on site[…]

The fanless spinning heatsink: more efficient and immune to dust

There’s a fundamental flaw with fan-and-heatsink cooling systems: no matter how hard the fan blows, a boundary layer of motionless, highly-insulating air remains on the heatsink. You can increase the size of the heatsink and you can blow more air, but ultimately the boundary layer prevents the system from being efficient; it’s simply a physical Read more about The fanless spinning heatsink: more efficient and immune to dust[…]

Last Space Shuttle Flight – STS-135. No replacement in sight.

Atlantis and its four astronauts left Earth for the final space shuttle mission, which will cap off an amazing 30-year program of exploration, which launched great observatories, built an International Space Station, and taught us more about how humans can live and work in space. With the International Space Station flying 220 miles high and Read more about Last Space Shuttle Flight – STS-135. No replacement in sight.[…]

Centralised databases abused by > 300 police officers per year

Over 900 police officers and staff in the UK were subject to internal disciplinary procedures for breaching the Data Protection Act (DPA) over the past three years, the Big Brother Watch revealed. After putting in a host of Freedom of Information (FoI) requests with forces across the UK, the Big Brother Watched discovered 98 police Read more about Centralised databases abused by > 300 police officers per year[…]