- Welcome Guest
- Sign In
A session on the role of emerging technologies in the courtroom was part of last month's New York State Bar Association Annual Meeting in New York City. A panel of local and federal judges, as well as an e-discovery researcher and emerging technology attorney, discussed the use of artificial intelli...
Spurred by everything from environmental concerns to the desire to avoid congested roads, companies are developing, testing, and beginning to implement a wide array of drone delivery systems. A number of practicalities need to be worked out before drone delivery becomes an everyday occurrence -- inc...
The World Health Organization has declared the coronavirus a global health emergency in recognition that the disease risk no longer is confined to China. United Nations member countries may decide to close their borders, cancel flights, implement special screenings at airports, or take other steps i...
Facebook recently promised that it would increase efforts to remove so-called "deepfake" videos, including content that included "misleading manipulated media." In addition to fears that deepfakes -- altered videos that appear to be authentic -- could impact the upcoming 2020 general election in the...
Cybersecurity risks for 2020 stretch far beyond the alarming spike in ransomware. In addition to the daily concerns of malware, stolen data, and the cost of recovering from a network intrusion, there is the very real danger of nefarious actors using cyberattacks to interfere with the 2020 U.S. gener...
Ransomware tops the list of cybersecurity threats for 2020. While there have been efforts to convince individuals, corporations, and municipalities not to pay ransoms, the simple fact is that whenever one is paid, the attack becomes a success that encourages cyber thieves to try again. Ransomware at...
CES is in full swing in Las Vegas this week, and the show for all things high-tech -- from gizmos and gadgets to cars and entertainment gear -- has attracted attendees from around the world. The first CES, or "Consumer Electronics Show" as it originally was known, took place in June 1967 in New York...
Recommerce -- or the online sale of used clothing and other goods -- is booming, with companies like thredUP and Poshmark meeting consumer demand for more affordable and sustainable alternatives to buying new. "I believe recommerce is popular because there is an alignment amongst people who see that...
D2C commerce is on the rise. Increasingly, consumers are expecting to interact directly with the companies that market and manufacture products. "Direct-to-consumer commerce has been enhanced by the explosion of the Internet. E-commerce provides a more convenient and frictionless buying experience,"...
Consumers increasingly are shopping by voice rather than typing on a keyboard or even searching on a phone. People are growing ever more comfortable with voice assistants, as the tech becomes smarter and more conversational every day. "Consumers appreciate the simplicity of using voice to shop," sai...
Unmanned aerial vehicles -- or "drones" as these flying objects more commonly are known -- pose a growing danger, cybersecurity expert Kevin Townsend recently warned. The drone category is broad -- it includes toys for hobbyists, tools for commerce, and devices used for a variety of military purpose...
As part of National Cyber Security Awareness Month, the National Cyber Security Alliance is advising all computer users to "Protect IT" by taking precautions such as updating to the latest security software, Web browser and operating system. The nonprofit public-private partnership, which works with...
When buying clothes, many consumers still prefer to head to a bricks-and-mortar store, browse the racks, and try things on. There's something about clothing, after all, that's inherently tactile and personal. Gradually, however, the way people buy clothes has been changing. Digital technologies are ...
Stopping cyberattacks requires diligent behavior. One of the themes of this year's National Cyber Security Awareness Month, or NCSAM, is that all computer users should take steps to Secure IT. That means shaking up the passphrase protocol by using not just strong passwords but strong and unique pass...