The Pentagon wants smartphones to track how you strut
/The Pentagon is testing technology that will let a smartphone identify you by the way you walk, as well as how you hold the device and swipe across the screen.
Read MoreThe Pentagon is testing technology that will let a smartphone identify you by the way you walk, as well as how you hold the device and swipe across the screen.
Read MoreResearch from MWR InfoSecurity Ltd. shows that threat actors can install malware on an Amazon Echo and turn it into a listening device. How effective is this attack, and is there any way to determine if an Amazon Echo has been compromised?
Read MoreBlockchain, the technology that made Bitcoin possible, has been getting a lot of attention in the IoT world, often because of its role in security. However, experts and practitioners said the potential of blockchain for IoT is deeper and broader than just keeping the bad guys out.
Read MoreThere’s no doubt that the Internet of Things (IoT) provides critical security challenges for healthcare organizations that need to be addressed.
Read MoreThe disciplines of user interface, industrial design and humanmachine interaction were born more than 20 years ago, in a world of desktop computers and heavy machinery. Yet, our notion and understanding of what it means to interact with technology, particularly the internet, are transforming radically. Our interactions are shifting from laptop to mobile and increasingly across other devices and connected form factors. As we add sensors and connectivity to our bodies, appliances, homes, cars, buildings, machines and just about everything else, interaction with the internet grows evermore indistinguishable from interaction with our physical world.
Read MoreI was born on the cusp of the internet revolution. As a kid, my friends and I roamed the streets and were more or less off the grid. Once we left the house, we were untraceable. We had to run to a friends house or a pay phone (remember those?) to get in touch with a parent.
Read MoreWeak and fragmented healthcare privacy regulations are failing to provide adequate federal laws to protect personal health information collected by wearable devices that are increasingly popular with consumers.
Read MoreA connected healthcare where patients can transmit data back to their physician to monitor their vitals after leaving the hospital has been a dream for many. The ability to leverage connected devices to capture and transmit relevant health information from a patient's heart monitor while at home or record oxygen levels while in the operating room shows the power of medical devices. But with the recent debilitating distributed denial of service attacks against some of the top DNS servers, such as those used by Amazon, many IT executives have had to question whether or not their IoT strategy is still safe or even possible.
Read More
The Rehabilitation Engineering Research Center for Information and Communications Technology Access (LiveWell RERC) is funded by a 5-year grant from the National Institute on Disability, Independent Living and Rehabilitation Research in the U.S. Department of Health and Human Services (grant number 90RE5028). The opinions contained in this website are those of the LiveWell RERC and do not necessarily reflect those of the U.S. Department of Health and Human Services or NIDILRR.