Ensurge Micropower Files for Multiple Patents for its Solid State Lithium Microbattery Technology

Ensurge Micropower ASA

Technology is first of its kind for powering the 1-100 milliampere-hour 

class of connected consumer, health and IoT sensor devices

Ensurge Micropower (OSE: ENSU, and OTCIQ: ENMPY), today announced it has filed several provisional patent applications for its solid-state lithium battery technology. The proprietary technology is the first of its kind that will enable 1-100 milliampere-hour (mAh) rechargeable microbattery products with the energy density, customizable form factors, charging speed and high-volume manufacturability to power a new generation of connected devices.

“Ensurge’s patent filings represent innovations developed over the past two years by our cross-functional teams as they

Read More

1More ComfoBuds Mini review: These tiny earbuds deliver surprisingly big sound

Read More

Microchip (MCHP) Aids Portfolio Via New Time Measurement System

Microchip Technology MCHP recently announced the launch of its time measurement system, which offers an alternative to Global Navigation Satellite Systems (GNSS) to deal with cyber security threats.

For the operational efficiency of infrastructures, nations are increasingly dependent on the accuracy of time. GNSS is the most common and widely used technology to broadcast timing and orbital information globally. It is a network of satellites, which broadcasts timing and orbital information used for navigation and positioning measurements. These satellites transmit signals, which report where they are and at what time. This information is used to determine the people’s location on

Read More

Attackers can access Dropbox, Google Drive, OneDrive files without a user’s password

Dropbox is one of those affected by this cloud vulnerability
(Image: CNET)

Hackers don’t even need your password anymore to get access to your cloud data.

Newly published research, released at the Black Hat conference in Las Vegas on Wednesday by security firm Imperva, shows how a “man-in-the-cloud” attack can grab cloud-based files — as well as infecting users with malware — without users even noticing.

The attack differs from traditional man-in-the-middle attacks, which rely on tapping data in transit between two servers or users, because it exploits a vulnerability in the design of many file synchronization offerings, including Google,

Read More