Remove Applications Remove Barcode Remove Development
article thumbnail

Alitheon gains traction with military and commercial applications for its ID system

GeekWire

The system, known as FeaturePrint , doesn’t use barcodes or blockchain. “What’s really new is the intellectual property that we’ve developed which allows us to do this with standard, off-the-shelf cameras,” he said. The barcode fell off, the sticker got erased. Just a standard camera. .”

article thumbnail

Inside the new Seattle Hub for Synthetic Biology, which uses DNA to ‘record biology over time’

GeekWire

Monday’s tour took place at the hub’s labs at Dexter Yard , a life sciences development in the South Lake Union neighborhood across from the Allen Institute, which is contributing $35 million to the hub over the next five years. The method involves generating DNA barcodes for each cell that reflect biological activity.

Barcode 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

QR codes in AI and ML: Enhancing predictive analytics for business

Dataconomy

This article examines the important connection between QR codes and the domains of artificial intelligence (AI) and machine learning (ML), as well as how it affects the development of predictive analytics. In the realm of AI and ML, QR codes find diverse applications across various domains.

article thumbnail

Best apps every student should use

Dataconomy

Students have access to a myriad of applications that improve study, productivity, and living in the digital era. This article details the best game-changing applications every student should consider. The app’s extensive food database and barcode scanner simplify meal logging and nutritional tracking.

Study 36
article thumbnail

Proving Physical Product Authenticity with Cryptographic Invisible Signatures

Dataconomy

The evolution of digital watermarking led to its application in diverse fields, including audio recordings, software, and even printed documents, and the technique – which can fall into both the cryptographic and the steganographic fields – has even been used by spies and hackers to transfer secrets or deliver malicious payloads.

article thumbnail

Nvidia offers retail loss prevention software to accelerate accelerator chip sales

CIO Business Intelligence

Nvidia isn’t packaging these workflows as off-the-shelf applications, however. Instead, it will make them available for enterprises to integrate themselves, or to buy as part of larger systems developed by startups or third-party systems integrators.

Retail 75