You can easily find 2D and 3D anatomical viewers, but what about pathologies? Visible Patient Planning is a 3D viewer of patient-specific...
Showing results 1 to 20 of 2,328
[UPDATED] Researchers find many security holes in the Java parts of Google's Platform as a Service offering, but get kicked off the service before finishing.
What value can be placed on the letter 'S'? If it's the 'S' in HTTPS, it could equate to a loss of productivity due to increased latency, greater battery drain for certain connected devices, and the loss of in-network value-added services, according to new research.
No more waiting around the wall sockets in the coffee shop or bar. Israeli researchers may have found a way to charge your phone to the brink in less than a minute.
Symantec researchers are impressed by Regin, which has been conducting high-level surveillance campaigns worldwide since 2008. Is it state-sponsored?
Researchers have combined image and natural language processing so computer vision can see a picture and then write a caption for it. Here's a stab at how this artificial intelligence advance could be applied to business.
AstroGrav is a precision solar system simulator that calculates the gravitational interactions between all astronomical bodies, so...
Researchers say a new demonstration shows that network operators can implement SDN to replace expensive proprietary routers.
Researchers are warning genuine apps can be easily replaced with fake apps, which can be used to vacuum up a smartphone user's entire store of data.
The pedsMRI app provides pediatric MRI protocols at the finger tips of the user. The intended users that are involved in performing...
Apple has thwarted WireLurker, discovered earlier this week, which has been targeting iOS users both through PCs and Macs.
Researchers warn that web sites and apps communicating via WebRTC may have broader access to computer microphones and cameras than users realise.
Researchers say WireLurker can infect installed iOS applications, automate a generation of malicious iOS applications and spread through enterprise provisioning.
Contactless VISA cards are supposed to have a transaction limit, but there is an easy way around it.
In a move that has surprised and angered security researchers, chip maker FTDI has admitted to issuing a silent update that bricks cloned FTDI FT232 [USB to UART] chips. UPDATED.
Italian researchers have come up with a new way of squeezing extra life out of standard lithium ion batteries, thanks to the miracle material.
Researchers are looking at how to fix the security flaws in the industrial control systems that run power stations, rail networks and the electricity grid.
Microsoft researchers have built a prototype of a new app-shielding technology called Haven, which builds on top of Microsoft's previous Drawbridge operating system work.
RMIT University researchers have developed new nanoscale data storage technology that mimics the human brain, and could see ultra-fast electronic memory devices reduced in size to just a few nanometres thick.
BT researchers have been running field trials using the ITU's draft G.fast standard, and have already achieved download speeds of 800Mbps over short distances. It certainly goes well beyond BT Infinity…
Security researchers have found the first malware using the new Bash bug.
Singapore government again underscores the need for private and public sectors, as well as researchers to boost the country's cyber ecosystem and urges better cooperation to combat cybersecurity threats.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)