Initially, the Internet was built for text, and technology has learned how to read at a pretty advanced level. However, the web has become increasingly visual, and tech has not fully kept up: the Internet can read, but it can’t see. In 2016, that will change. Image recognition an … | Continue reading
We do not possess the ability to read the future, and yet we can predict with a high level of certainty that we will see more major cybersecurity incidents in 2016 and 2017. The world’s cybersecurity capability is not able to advance in line with the growing vulnerabilities. Incr … | Continue reading
TP-Link has just declared that it won't allow its routers to be updated by current third-party tools, thanks to FCC rules that mandate new restrictions starting in June 2016. This is the outcome enthusiasts were afraid of -- but is TP-Link a canary in a coal mine or an outlier? | Continue reading
FCC Chairman Tom Wheeler has proposed a new set of rules that would set strict limits on what data ISPs can gather and sell about their customers. | Continue reading
If you judged each country based on how many websites used their two-letter Internet domain code, like Canada’s .ca or India’s .in, the U.S. would pale in comparison to the might of the United Kingdom, Germany and China.Nominet, the official registry for UK domain names, created … | Continue reading
The Maryland Special Court of Appeals has upheld a lower court ruling that threw out data gathered via stingray on the grounds that the evidence was impermissible. It's one of a handful of wins for privacy advocates and those concerned about the proliferation of surveillance tech … | Continue reading
This post was brought to you by Telefónica.Technology is increasingly seen as an essential component of our daily lives, and so too are the global tech companies ushering us into the digital age. Google, Facebook, Apple, Uber and AirBnb are just a few of the companies shifting th … | Continue reading
A new ransomware program is thought to be the first of its kind for Apple systems. Is this a one-off, or are more on the way? | Continue reading
Former Homeland Security secretary Michael Chertoff spoke at the RSA conference this week, where he claimed forcing Apple to decrypt a device for the FBI is equivalent to biological warfare. | Continue reading
Amazon has dropped encryption support from its latest tablet OS, but the timing makes it look more suspicious than it probably is. | Continue reading
The rise of the newest crop of TLD and what they can do for you. | Continue reading
It’s no secret that “data scientist” is one of the hottest job titles going. DJ Patil famously proclaimed data scientist “The Sexiest Job of the 21st Century” before moving on to join the White House as the first chief data scientist of the U.S. Once a rarified in-house role at a … | Continue reading
European Commission, 25 Avenue de Beaulieu Brussels, 7 March 2016 This workshop offers an opportunity to learn of progress in the standardization of Cloud contracts and SLAs by ISO-liaison body SLALOM and cloud procurement by PICSE, two EC-backed initiatives. Delegates can contri … | Continue reading
Two events organised by AppHub in Brussels to promote open source innovation The AppHub team is glad to welcome you and your partners involved in open source innovation in Brussels, at two upcoming events, with interactive support for your project and AppHub Store demontrations: … | Continue reading
Sometime in the mid-2000s, hedge fund owners got an idea. Financial markets are impacted by the news — so if you can thoroughly understand the news, and do it quickly, you can have a headstart on changes in the market. Using artificial intelligence, they devised software that cou … | Continue reading
The Raspberry Pi is arguably the world's most successful and accessible computer platform that anyone can program. Today, the Raspberry Pi foundation has launched the Raspberry Pi 3, an upgraded model that is on sale now for the same $35 price. | Continue reading
At least one defendant was arrested thanks to data from CMU's Tor attack, and that might just be the tip of the iceberg. | Continue reading
New reports from Croatia suggest Episode VIII will use anti-drone technology and 600 guards to keep prying eyes away from the film sets. We're this close to seeing full on drone-on-drone warfare -- hopefully with proton torpedoes and wing-mounted laser cannons. | Continue reading