Are car sensors the next cool thing, or an invasion of privacy?
Written by Teresa Meek
Article about vehicle-to-vehicle (V2V) communication, touching on vehicle-to-infrastructure (V2I) efforts, government involvement, and models that feature V2V technologies.
Faced with an onslaught of privacy problems, Uber commissioned an investigation into its privacy. But the investigators were handcuffed to such a degree that it served more to undermine than to boost confidence.
Amazon is pulling the plug on projects faster than ever. Are it becoming more responsive, cutting back on due diligence or simply losing its nerve?
A blog post for lynda.com to support my video course, "Freelancing Fundamentals".
Videojournalism about how researchers are teaching computers to understand the processes that create human emotion, possibly leading to better decisions and human-computer interfaces.
Authors Filippo Bonchi and Damien Pous discuss "Hacking Nondeterminism with Induction and Coinduction," their Research Highlights article published in the February 2015 Communications of the ACM.
From powerhouses to light 2-in-1 models, these laptops -- including two ThinkPads and a MacBook Pro -- should all run Windows 10 like champs.
While restrictive, Apple is a company every tech firm must work with.
What is 'good enough' security and when you need something better.
Written by David Strom
These days, mobile tech has to both work well and look good. These stylish portable battery chargers can keep your mobile devices running through the day -- and attract envious looks at your next power lunch.
Written by Barbara Krasnoff
It's a classic security Catch-22. The government wants enterprises to share the most sensitive security details, on the rationale that it will make everyone more secure. Businesses are insisting on strict liability and the government agrees. But the specifics don't add up.
Videojournalism about an online system that interprets newsfeeds, placing items on a map and categorizing them in various ways.
Stephen Gould discusses image understanding and pixel labeling, the topic of "Scene Understanding by Labeling Pixels" from the November 2014 Communications of the ACM.
Videojournalism introducing a paper that outlines how both computers and members of natural communities (such as ants, birds, and cells) cooperate.
Pitching ideas or business proposals gets an advantage when done up close and personal.
Once a plodding behemoth, the new Microsoft is increasingly nimble, responsive to feedback and focused on mobile. James Kendrick is very impressed with Redmond's ongoing transformation of its products and services.
A review of the long tails in the app stores.
As the debate came to a head last December over whether the FCC should reclassify the Internet as a telecommunications service under Title II of the Telecom Act of 1934, Scott examined why neither side of the two-sided coin was the right one to be associated with.
Written by Scott M Fulton III
Adobe researcher Sylvain Paris explains how a new method of combining Gaussian and Laplacian pyramids results in image filters that can enhance details without distorting edges.
When Amazon rolled out its cloud E-mail package, it talked a lot about user-controlled encryption. What it neglected to mention was that it retained backdoor access--which it planned to use.
If there's anyone left on the planet who thinks Linux is written by undateable guys in their parents basement, the latest Linux Foundation report, Linux Kernel Development: How Fast It is Going, Who is Doing It, What They Are Doing and Who is Sponsoring It, should put an end to that delusion.
Written by Steven J. Vaughan-Nichols
The "smart" electric grid has held great promise for 15 years, but it's not always been clear how deeply it's penetrated our infrastructure -- or what benefits it's delivered. The current state of smart-grid technology, who's implemented it, and where improvements are likely to appear.
Ph.D.s: Want a month of all-expenses-paid training, with a six-figure job waiting for you when you're done? That's what a new crop of "data-science boot camps" offer -- for those who qualify.
Article about using power gathered from radio waves, heat, and motion to power small devices such as sensors and cell phones.
The iPad is a capable tool for work but requires good apps to provide the needed functionality. These 10 apps will go a long way to meeting the needs of most iPad users. You can't work all the time so we threw in a hot new game for down time.
How companies can learn organizational behavior from Occupy Wall Street
With streaming services competing with Hollywood and media networks, how will the concept of "television" evolve—if at all?
When it comes to unified threat management appliances aimed at the SMB market, vendors are finding a way to fit additional security features into smaller and more powerful appliances.
Written by David Strom