Moving into software defined networking and devops? Here's the skills you need and how to acquire them Article 2065 words 5 votes
Google TossingBot - DeepLearning meets physics to create a robot that can grasp and throw items google Link 3 votes
Behind The Scenes - Jaguar Catwalk - A CG Jaguar That Reacts To The Audience In Real-Time Using AI Gesture Recognition (video) Link 3 votes
How blockchain is being applied to improve the world and its potential to solve major world problems Article 1452 words 2 votes
Eleven technologies that didn't survive into the sci-fi future Article 1515 words, published Nov 18 2013 2 votes
SELinux's approach (restrict everything unless explicitly permitted) is the opposite of Linux's (permit everything unless explicitly forbidden). That makes setup different, linux security Article 2622 words 4 votes
Forgive fast, block even faster and other rules for maintaining your sanity on the internet social media internet Link 6 votes
Potential impact of two IoT security and privacy laws on tech industry privacy security Article 1543 words 6 votes
Four perfectly reasonable-sounding 2018 technology predictions that failed Article 1765 words 8 votes
By ending default communities, Reddit increased disinformation social media Article 410 words 25 votes
Wait -- you can have happy users?! Tips on how to improve relationships between the IT Dept and users Article 1074 words 5 votes
One healthy diversity data point: research reports an uptick in women applying for IT jobs Article 858 words 4 votes
Using insects as templates, researchers are buildings robots that are very small, very mobile—and very useful Article 1267 words 10 votes
Venmo's public API exposes millions of transactions, startling users privacy security Article 747 words, published Jul 18 2018 10 votes
Security research underway to ensure you will not be carjacked by hackers security Article 1252 words 4 votes
Layoffs at Watson Health reveal IBM’s problem with AI Article 1932 words, published Jun 25 2018 7 votes
Cybersecurity experts from Homeland Security, the National Intelligence director's office, and private industry discussed how they're working to counter the most urgent threats security.national security.cyber Article 1976 words 3 votes
In order to cultivate an environment where the truth wins out in the end, you have to be biased against falsehoods facebook Article 706 words 8 votes
Algeria shuts down the internet for two hours to prevent leaks and cheating on exams Article 334 words 9 votes
Arm-based supercomputer prototype to be deployed at Sandia National Laboratories by US DoE Article 865 words 3 votes