Get our free email newsletter

Search Results

Guidelines for Autonomous and Connected Vehicle Testing

Fully Evaluating Performance and Safety Considerations is Critical to Successful Deployment As wireless communications technology...

New Method Could Stop Cyber Attacks On GPS

Scientists from the UTSA Department of Electrical and Computer Engineering have designed a computer algorithm to fight back against cyberattacks

FCC Commissioners Oppose Nationalization of 5G Network

The Commissioners of the U.S. Federal Communications Commission (FCC) don’t typically agree on much...

FDA Approves Remote Reprogramming of Cochlear Implant Device

In a first for the agency, the U.S. Food and Drug Administration (FDA) has...
- From Our Sponsors -

Improving Data Efficiency by Converting Optics to Sound

A new microchip that converts optics to audio could lead to faster and more efficient data processing.

Ultra Small Antennas to Serve as Miniature Brain Implants

A new type of miniaturized antennas could prove a big step forward for implantable brain technology.

Wearables for Medical and Wellness Uses: Standards and FDA Guidance Documents

This article will focus on the U.S. Food and Drug Administration’s guidance documents and the standards applicable to wearable medical and wellness devices.

St. Jude Medical Addresses Critical Device Failure

With two recalls on implanted devices and the impending threat of major cyber attacks, St. Jude Medical Inc. has begun looking for solutions to its compounding problems.
- From Our Sponsors -

Researchers Develop Algorithms to Defend Smart Grid

The U.S. Department of Energy is moving to a “smart grid” model This new energy system will use digital technology to communicate and transfer energy in a more thoughtful way. The downside is that opening additional access points make the grid vulnerable to both accidental and malicious power failure. It’s possible for hackers to send false information to mislead grid operators, influencing the decisions they make about how to manage the network of electricity. One approach for securing the grid from potential cyberattacks uses game and control theory.

Using Radio Signals to Steal Computer Files

A New York cybersecurity company has demonstrated a simple method to hack into seemingly...

Digital Sponsors

Become a Sponsor

Discover new products, review technical whitepapers, read the latest compliance news, trending engineering news, and weekly recall alerts.

Get our email updates

What's New

- From Our Sponsors -

Sign up for the In Compliance Email Newsletter

Discover new products, review technical whitepapers, read the latest compliance news, trending engineering news, and weekly recall alerts.