Advertisements
A personalized internet experience comes at the price of your privacy and personal data. How far are you willing to go?
internet of things devices
The evolution of edge computing is closely intertwined with the emergence and proliferation of internet of things (IoT) devices.
ICOs as a method of funding face face a multitude of shorcomings. STOs are the natural evolution that help mitigate a number of ICOs' limitations.
Self-driving cars have been among human fantasies since vehicles entered our lives. But we read a lot these days about how the dream is fast becoming reality and will revolutionize the transportation industry. According to...
As the saying goes, “There’s more than one way to skin a cat.” And this proverb exactly describes the situation with passwords. I’ve already discussed the inherent problems with passwords in a previous blog post,...
At I/O 2019, Google declared its Assistant will perform its AI computation on user's devices instead of sending data to the cloud. Here's why it's a big deal.
IT security teams at firms and organizations are mainly focused on protecting corporate networks against outsider intrusions, unaware of the dagger aimed at their backs, i.e. insider threats. What’s the use of erecting walls and...
Social media companies are showing an increasing interest on providing cryptocurrency payments to their users. Against the norm in the cryptocurrency world, there's a real use case here.
Detecting deepfakes is a cat-and-mouse game that is becoming harder every day. Archangel, a project by the University of Surrey, uses neural networks and blockchain to prove their provenance of videos and protect them against tampering.
Two days ago one of the worst crimes against humanity in recent years took place in Syria. The government of Bashar al-Assad carried out an aerial bombing on the town of Khan Sheikhun, targeting defenseless...