sensor

Photos: Innovation sprouts up among the lettuces

Photos: Innovation sprouts up among the lettuces

Inside the 21st Century farms managed from a smartphone.
Jul 14 2014 5:46AM
Snowy Hydro finds extra power with intelligent systems

Snowy Hydro finds extra power with intelligent systems

Data boom gets more from existing generators.
Dec 10 2012 8:23AM
Yarra Trams to sense when tracks need maintenance

Yarra Trams to sense when tracks need maintenance

Posts incidents on Instagram to make customers less angry.
Oct 12 2012 7:00AM
Researchers eye visual intelligence for UAVs

Researchers eye visual intelligence for UAVs

Queensland project wins funding.
Jan 6 2012 7:56AM
Fruit fly brains for wireless deployments

Fruit fly brains for wireless deployments

Scientists apply insect nervous system to distributed computing.
Jan 14 2011 6:01AM
Researchers to treat stroke victims with Wii

Researchers to treat stroke victims with Wii

Fifty patients sought in Kiama Downs NBN test area.
Jun 28 2010 5:34PM
IBM wins a slice of Energy Australia's smart grid

IBM wins a slice of Energy Australia's smart grid

IBM has won a $3.2 million systems integration deal to help Energy Australia capture and make use of the data drawn from its world-leading $170 million Intelligent Network or "smart grid".
Apr 1 2009 12:19AM
Next-gen digicam relies on just one pixel sensor

Next-gen digicam relies on just one pixel sensor

From mega pixel to single pixel.
Oct 4 2006 10:06AM
Review: Sentivist IPS Sensor 500

Review: Sentivist IPS Sensor 500

NFR's Sentivist IPS uses a combination of hardware sensors, and software for managing. It ships with a Java-based management console, which is good for monitoring and configuring individual sensors.

Jun 30 2005 12:00AM
Review: RealSecure Network Sensor

Review: RealSecure Network Sensor

RealSecure 7.0 is the result of the integration between RealSecure and the BlackICE NIDS sensor technology. It runs on a dedicated machine and acts as a NIPS sensor to monitor a network segment, looking for intrusions or suspicious activity. If an intrusion is suspected, it can respond by recording details of the event. It can notify the network administrator, reconfigure the firewall, or terminate the event.

Apr 1 2003 12:00AM

Log In

Username:
Password:
|  Forgot your password?