Tags » Pervasive Computing

The challenge for pervasive system developers here is to detect the user intention so as to remove any ambiguity in the user’s expression of a pervasive action.

65 more words
Vkarthikn Blog

The Power of Data Visualization

I had an extremely enjoyable time delivering a guest lecture to the Master students at the College of Information Science & Technology,  University of Nebraska at Omaha. 26 more words

Context Awareness
by Dr. Matt Roach

I arrived at the Digital Catapult fresh off an early train from South Wales, on what seemed like the first bright sunny day in memory (or, of this calendar year at least). 1,676 more words

British spooks 'could hack into children's toys for spying'

http://www.telegraph.co.uk/news/politics/12041349/British-spooks-could-hack-into-childrens-toys-for-spying.html

Britain’s intelligence agencies could take over children’s toys and use them to spy on suspects, MPs have been told.

Antony Walker of techUK said that anything connected to the Internet could “in theory” be hacked into remotely. 140 more words