je.st
news
Tag: detects
$34 accessory detects HIV, syphilis, and works with any smartphone
2015-02-06 21:00:01| Extremetech
A new research initiative has created a $34 smartphone accessory that can test blood for both syphilis and HIV, requires no battery, and can be easily deployed at scale.
Laser Sensor detects 1 mm distance changes.
2015-01-27 14:33:24| Industrial Newsroom - All News for Today
Designed for difficult distance-based applications over range of 25–300 mm, Model Q4X detects distance changes as small as 1 mm on targets such as black objects on black backgrounds or reflective items. High excess gain and 64-element imager combine to minimize errors in detection, counting, and validating orientation. Supplied in IP67, IP68, and IP69K rated stainless steel housing, sensor has angled 4-digit, 7-segment LED display and provides bipolar outputs.
Tags: changes
distance
laser
sensor
Millimeter Wave Scanner detects concealed weapons.
2015-01-05 14:31:50| Industrial Newsroom - All News for Today
With 2048 sensor elements in its transmitter and receiver, Array60 enables detection of concealed weapons underneath clothing and in backpacks. Portable standoff screening system implements wafer scale beamforming, advanced electronics, and signal processing. In addition to detecting weapons, system can detect heartbeat of person at standoff, offering solution for remote sensing of stress.
Tags: wave
weapons
scanner
detects
Crystal Ink Detects Funny Money
2014-12-22 07:28:00| Chemical Processing
New photonic crystal ink developed by a team of Chinese researchers reveals intricate patterns when breathed on, making it extremely hard for counterfeiters to reproduce.
Security Software detects insider and targeted threats.
2014-12-12 14:30:49| Industrial Newsroom - All News for Today
Delivering combination of dynamic community threat analysis and real-time detection of cyber attacks, X-Series Platform puts organization’s key assets at center of real-time investigations of insider and targeted threats. Organizations can identify potentially threatening individuals and hosts, understand details of any anomalous behavior, and perform quick triage and prioritization of incident response to best protect most important assets.
Tags: software
security
insider
targeted
Sites : [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] next »