Month: May 2018

When to Decide to Reuse or Recycle Old Electronics

With the current global waste crisis we’re experiencing, you’ve more than likely heard the phrase: “Reduce, reuse, and recycle.” In fact, for recyclers this phrase is known as the waste hierarchy. These terms designate three essential components of environmentally-responsible behavior and are listed in the order of preferred action from least harmful to most harmful …

When to Decide to Reuse or Recycle Old Electronics Read More »

Tech Fabric Lets You Charge Electronics By Walking in the Rain

Would you have ever imagined technology reaching a point where you could charge electronics in the rain? It might have sounded impossible just a few short years ago, but in today’s highly connected world, technology is accomplishing the unthinkable. Nexus Media published an article claiming that users could soon be charging their electronics by simply walking …

Tech Fabric Lets You Charge Electronics By Walking in the Rain Read More »

Sprint IoT Factory Announced

May 18, Sprint announced the launch of the Sprint IoT Factory, a game-changing online marketplace that represents businesses with a wide selection of complete, ready-made boxed solutions that leverage the power of IoT to help them do business smarter. Envisioned as an online marketplace offering a broad range of ready-made Internet of Things solutions, the …

Sprint IoT Factory Announced Read More »

Australia Looks to Turn Plastic Waste into Usable Energy

Much like the rest of the world, Australia is currently experiencing a recycling crisis and is looking beyond recycling and landfilling processes for waste management options. While waste like paper or organic matter can be composted and other materials like glass, metal and rigid plastics can be recycled, the country is focused on looking to …

Australia Looks to Turn Plastic Waste into Usable Energy Read More »

Detecting, Recovering, and Preventing from Cryptojacking

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers are able to do this by either getting an unsuspecting victim to click on a malicious link sent via email that will then load crypto mining code on the victim’s computer, or by infecting a website with JavaScript code that auto-executes once …

Detecting, Recovering, and Preventing from Cryptojacking Read More »