- Welcome Guest
- Sign In
People are freaking out about reports of NSO Group's Pegasus surveillance tool being used to spy on journalists, political dissidents, and other opponents of regimes worldwide. It's disheartening, and worth discussing. But why are we shocked? In Pegasus' case, the game theory is clear: some company ...
Policymakers should be fostering the use of artificial intelligence in making workforce decisions, not inhibiting it, according to the Center for Data Innovation. In a report released Monday, the global think tank called on governments to encourage AI adoption and establish guardrails to limit harms...
Much of what you are going to see at Siggraph this week has to do with creating the Metaverse, which is conceptually very similar to the artificial world that the movie "The Matrix" showcased. This technology will not only have a massive impact on lower-cost and far better movie graphics, but also o...
Even as operations as diverse as factories and hospitals are moving at least portions of their daily computational processes out of the centralized cloud and into various edges, edge computing for many people remains a mysterious concept. To provide some clarity and insight, we spoke with several ex...
Tapping into natural language understanding technology as part of an overall approach to managing customer relations improves the experience that businesses provide to their customers. Brands already implement a variety of solutions to gain data and insights from customer interactions. Still, many c...
Let's explore the the state of affairs with electric cars, and key determinants to consider if you have your mind on an EV. Then we'll close with the product of the week -- a new laptop from HP.
Amazon last week held its Alexa Live 2021 developer conference, which would have been a lot more fun if during the event the Amazon Echo show in my office hadn't gone insane. Let's talk about the promise and some of the problems with the coming wave of ambient computing devices. Then we'll close wi...
One of the fundamental choices that an e-commerce retailer must make is the platform they use to sell their goods and services, because it's not just a store -- it's a place to connect with customers and create a sense of the brand. We spoke with several e-commerce experts to get their take on how r...
Anyone with a stake in keeping ahead of cybersecurity assaults and enterprise network intrusions through API vulnerabilities can now tap into expert advisories and security reports. API security company Salt Security last week launched Salt Labs, a now-public forum for publishing research on API vul...
In addition to its condemnation of China, the White House announced that the U.S. Justice Department has filed charges against four Ministry of State Security hackers allegedly engaged in a multiyear campaign targeting foreign governments and entities in key sectors, including maritime, aviation, de...
It's been a sweltering summer for those of us on the West Coast of the United States, and keeping power bills down when running air conditioning 24/7 is a challenge. This week, let's highlight technologies you can use to personally respond to the heat problem and deal with a world that is becoming ...
With resale appealing to a growing share of consumers, chief among them Gen Z, more brands are jumping on the bandwagon. Levi's, Lululemon, and Nike all launched in-house resale programs over the last year. However, the rise of resale comes with many challenges for e-commerce brands and marketplaces...
After a successful rollout in the U.S. earlier this year, Amazon is expanding support for end-to-end encryption for video captured on its Ring products. Part of what's motivating this is probably setting a higher global standard so wherever Amazon goes, they will be welcome by satisfying stringent l...
Ransomware gangs are increasingly turning to specialists to complete their capers on corporations, according to a Dark Net intelligence provider. A report issued by Tel Aviv-based Kela noted that the days when lone wolves conducted cyberattacks from start to finish are nearly extinct, as the one-man...