Space Exploration Participation Community Has Lift Off
A ground-breaking way to fund international space projects, which makes space exploration available to the public, is launching today (January 24) during the World Economic Forum in Davos,...
View ArticleIDG Contributor Network: What, why, and when do we automate?
While automation isn’t the newest form of technology in the press today, it is arguably primed to have the greatest impact on how people and businesses operate in the next decade.From sleek...
View ArticleATT CEOrsquo;s net neutrality plan calls for regulation of websites
ATT also wants to make sure net neutrality law wonrsquo;t be too strict.
View ArticleAlphabet’s “Chronicle” is a moonshot company for cybersecurity
Itrsquo;s a “cybersecurity intelligence platformrdquo; powered by Alphabetrsquo;s servers.
View ArticleBrandPost: Why Saving 30% on Your Cloud Deployments May Be a Bad Deal
Imagine that you receive your monthly cell phone bill, and you are shocked to see how much you’re spending for your family-service plan.A quick check of the bill’s details reveals one especially...
View ArticleBell Canada Canucks it up again: Second hack in just eight months
Subscriber database plundered by miscreants once again Executives at Bell Canada have been left with faces redder than their nation's flag – after their subscriber database was hacked for the second...
View ArticleIDG Contributor Network: 5 financial data trends to watch for in 2018
Another year, another round of trends.Given recent funding announcements, acquisitions and technical advancements in the industry, 2018 promises to bring plenty of new developments to the realm of...
View ArticleSHL just got real-mode: US lawmakers demand answers on Meltdown, Spectre...
Pact of silence questioned Four Republican members of the US House of Representatives sent letters on Wednesday to the leaders of Amazon, AMD, Apple, ARM, Google, Intel and Microsoft seeking answers...
View ArticleMobile point of sale gets a PCI security standard
Because crooks salivate when you punch a PIN into a smartmobe at a market stall The advent of mobile point-of-sale (MPOS) systems has been a boon for consumers and retailers of modest means, but the...
View Articlelibcurl has had auth leak bug since ‘the first commit we recorded’
Fixed in 7.58.0 If you use libcurl, the command line tool and library for transferring data with URLs, get ready to patch.The tool has a pair of problems, one of which is an authentication leak.…
View ArticleIDG Contributor Network: Data quality goes big-time with GDPR in 2018
Data quality can be thought of as the degree to which data reflects accurate, timely, valid, and consistent information in relation to the portrayal of the actual scenario. Put simply, does a customer...
View ArticleIntel alerted computer makers to chip flaws on Nov 29 – new claim
Total coincidence: That's the same day Chipzilla's CEO sold off his shares Intel quietly warned computer manufacturers at the end of November that its chips were insecure due to design flaws, according...
View ArticleCompression ignition engines are a big breakthrough—we got to try one
It's called Spark Controlled Compression Ignition, and Mazda made it work.
View ArticleDealmaster: Get a 55-inch 4K Roku TV for $370
Plus deals on Bluetooth headphones, gaming laptops, SSDs, and more.
View ArticleNew form of qubit control may yield longer computation times
Finessing qubit control may be better than hammering the message home.
View ArticleHumans expanded out of Africa 40,000 years earlier than we thought
The discovery sheds new light on the timing of early human migration.
View ArticleFCC broadband committee wants to restrict publicly-owned networks
Ajit Pai accused of tilting broadband committee toward industry representatives.
View ArticlePerv raided college girls’ online accounts for nude snaps – by cracking their...
Personal info obtained to pull off 1,400 password resets. Now he's behind bars Jonathan C. Powell, who hacked into over 1,000 email accounts in search of sexually explicit images and videos of...
View ArticleHere we go again… UK Prime Minister urges nerds to come up with magic crypto...
Broken security? More like broken record UK Prime Minister Theresa May has reiterated calls for a special magic version of encryption to be developed by technologists so law enforcement can access...
View ArticleIDG Contributor Network: Handing off models from data science to IT
With the amount of time and energy that’s spent on perfecting and creating an analytic model, you’d think it would come at the hands of a wizard or sorceress. Unfortunately, there’s no magic wand that...
View Article