Japan has seen a sharp rise in innovation investment ahead of the 2020 Tokyo Olympics, as the country and its major corporations look to increase foreign investment.
Lessons learned from smart and intelligent urban projects worldwide can open new avenues to create healthy, sustainable, and happy places for everyone, writes Sylvie Albert professor of ...
According to new research, consistent internet usage results in a change in our brain's activities. In turn, there is a risk against groups like Generation Z, who are more exposed to the ...
A cheap and easy way of measuring the brain activity of individuals with epilepsy could be a revolutionary step towards more convenient management of the condition.
Smart grids offer the potential for cheaper electricity and lower emissions - but their very nature makes them susceptible to cyberattacks that could have devastating consequences. Here's...
New research suggests a way to map precisely where and how to use groundwater recharge to refill Californian aquifers and stop the land from sinking.
Companies that are already embracing IoT in their factories are finding that the benefits supersede the barriers
The entire digital universe is expected to reach 44 zettabytes by 2020.
There are major risks associated with the proliferation of connected devices that capture our data.
5G will enable new revenue streams from IoT and industrial applications, and accelerate digitalization in the Middle East and Africa.
Smartphones are the most pervasive, versatile and capable connected devices we use on a daily basis. So how do we harness their capabilities for scientific data collection?
It's up to manufacturers, retailers and regulators to convince consumers that the internet of things is safe, says Philippa Hunt of Consumers International.
As the world wide web turns 30, we are only just beginning to realise its potential – for good and bad.
From an initial set of connections based in the US, a satellite link to the UK started the the beginnings of a global network of connected computers.
From advanced phishing to remote access and distributed denial-of-service attacks, cybercriminals are using ever more advanced technology. How vulnerable are you?