
For Swiss Data Industry, NSA Leaks Are Good as Gold
• http://www.technologyreview.com, By Russ JuskalianHere’s how the Swiss promise to keep your data safe.
Here’s how the Swiss promise to keep your data safe.
For many, bitcoin — the distributed, worldwide, decentralized crypto-currency — is all about money … or, as recent events have shown, about who invented it.
From a winch elevator at the base of the Wall, the 700-foot structure that bisects the land of Westeros in Game of Thrones, I can see the stone buildings of Castle Black illuminated by torches.
Lucid dreaming is believed by many to aid in practicing skills, improving creativity, or just exploring adventurous new worlds, but requires practice and awareness to master.
The Unfinished Car
Many people seem to be constantly connected to smartphones, constantly sending messages back and forth. It may not be long before your car is doing the same thing. Apple is developing a new generation of electronics that will bring smartphone cap
The future of oil exploration lies in new technology--from massive data-processing supercomputers to 4D seismic to early-phase airborne spy technology that can pinpoint prospective reservoirs.
Google executive Eric Schmidt was on CBS this morning promoting his new book and announcing a $1 million giveaway to tech innovators.
Project Tango constantly scans its surroundings, giving people--and Google--better maps than ever
In Depth The grass is sometimes greener on the Android side
Cody Wilson, 26, made news when he uploaded plans for the Liberator – a 3D gun. It has been downloaded 100,000 times
The most sophisticated malware-driven espionage campaign ever discovered, in an attack dating back to at least 2007 that infected computers running the Windows, OS X, and Linux operating systems of 380 victims in 31 countries.
Mozilla, maker of the popular Firefox web browser, is putting its weight behind new efforts to significantly improve the speed of the country’s internet connections.
Pharmacy giant CVS is booting cigarettes and other tobacco products from its stores. The change has earned CVS showers of praise, including from the White House, but there’s one player not getting the credit it should: Amazon.
In October of last year, the Canadian Avalanche Centre (CAC) issued a warning about the dangers of relying on smartphone apps that were being marketed as economical alternatives to avalanche transceivers.
Fuel3D has release the first images of its 3D scanner.
If the Army is going to keep up with military readiness pressures while also seeing a reduction in troop size and stagnant budgets, then it’s going to need more cutting-edge videogames.
App permission requires access to SMS messages.
Most people think of bitcoin as a form of money, if they think of bitcoin at all. But 19-year-old hacker Vitalik Buterin sees it as something more — much more. He sees it as a new way of building just about any internet application.
So we're good! Nothing to worry about here. Move along.
A new software project was announced that hopes to “replace YouTube, Dropbox, Facebook, Spotify, ISPs, and more with decentralised apps”.
While Microsoft Excel is an impeccable program, sometimes you're forced to scrounge for data from less organized places.
One of the world’s longest-running open source software projects will live on, thanks to a Romanian bitcoin baron.
The porn industry has a pretty good track record as an early adopter
In Rocky Mount, North Carolina, a firefighter sits behind his desk.
Just the other day, I got a card in the mail for my 30th birthday. When I opened it up, the card started singing “Happy Birthday.” And that little thing — pealing out at the top of its automated lungs — made me laugh. What a strange thing to computer
Lack of progress toward an "Internet of Things" has been attributed to a variety of factors. Indeed, enabling devices from different manufacturers to communicate in an effective and useful manner is no simple task.
Ones that make smart glasses seem cool rather than creepy
In the first proven attack of its kind in history, a refrigerator has been used to hack into computers. The home appliance was used to send spam emails in a cyber-attack in December. From December 23rd through January 6th, smart home electronics w
In the technology age, it seems that nary a week or two passes without another sad story relating that Americans' personal information and privacy has been compromised.