Waymo moves beyond driverless taxis with trucking program
Atlanta is Waymo's hub for real-world tests of its self-driving trucks.
View ArticleHands-on with Android P—Is this the beginning of a new design language?
We play "spot the differences" with the Android P Developer Preview.
View ArticleCitizen Lab says Sandvine network gear aids government spyware
Sandvine insists report is inaccurate and misleading Internet users in Turkey, Egypt and Syria who attempted to download legitimate Windows applications have been redirected to nation-state spyware...
View ArticleWhat’s new for developers in Android P
The initial developer beta of Google's forthcoming Android P operating system looks to entice developers with enhancements for Kotlin coding, machine learning, and application compatibility.The use of...
View ArticleWhat’s new in LLVM
The LLVM compiler framework has gone from being a technological curiosity to a vital piece of the modern software landscape.It is the engine behind the Clang compiler, as well as the compilers for the...
View ArticleIDG Contributor Network: The intangibles of picking a public cloud
Moving all or part of your operations to a public cloud provider will be the most substantial decision many CTOs and CIOs will make in their careers, and a misstep could cripple your company for...
View ArticleSlingshot malware uses cunning plan to find a route to sysadmins
Advanced router code has been in circulation for six years If you’re trying to hack an organization then pwning the sysadmin's machine gives you the keys to the kingdom, and an advanced malware writer...
View ArticleLess than half of paying ransomware targets get their files back
Shock revelation: criminals prove to be untrustworthy Paying off a ransomware demand is a great way to end up losing both your money and your files.…
View ArticleAuto manufacturers are asleep at the wheel when it comes to security
And rising car thefts suggest the criminals are taking advantage Cars are getting smarter every year but their increasing computational power isn’t being backed up by good IT security practices –...
View ArticlePotent malware that hid for six years spread through routers
Nation-sponsored Slingshot is one of the most advanced attack platforms ever.
View ArticleElon Musk debuted a trailer “for the next part of the human story” at SXSW
People arrived excited about a giant marketing installation; they left looking to the stars.
View ArticleSurvey: Most people don’t understand science, want their kids to do it
People aren’t convinced that science is useful, want their kids to do it anyway.
View ArticleRazer Blade Pro FHD review: The screen is its best and worst trick
Mostly compelling as a “so-close-yet-so-farrdquo; entry in competitive gaming laptop scene.
View ArticleValve lets us loose in its new offices, unlocks the doors to a rare merch room
Gallery: Valve recently moved to new offices, so we took every photo we were allowed.
View ArticleBrian Michael Bendis on life at DC: Batman didn’t lure him; “I wanted Superman“
"Now Twitter is full of people around the world tweeting me about someone elsersquo;s underwear."
View ArticleEyes-on with the HTC Vive Pro: Not a revolution, but also more than resolution
We take a closer look at a Ready Player One event during SXSW.
View ArticleUK’s air accident cops are slurping data from pilots’ fondleslabs
'We need the families' assistance' says AAIB A British government agency has been downloading data from iPads and similar devices used by pilots of crashed aircraft, it has emerged.…
View ArticleHUBER+SUHNER to demonstrate plans for 5G and network densification at OFC 2018
Alongside the latest optical switch from Polatis and HUBER+SUHNER’s high speed RF test solutions portfolio, Cube Optics will launch standard-setting PAM4 modulated ROSA San Diego, 12 March 2018 -...
View ArticleIDG Contributor Network: The wonders of AI—or the shortcomings of search?
About seven years ago, I developed a 13-part functional model for what a big data and analytics (BDA) solution needed to contain. Key components included things like data governance/master data...
View ArticleChina ALTERED its public vuln database to conceal spy agency tinkering –...
Report claims vuln-botherers share building with Ministry of State Security China has altered public vulnerability data to conceal the influence of its spy agency in the country's national information...
View Article