Why smartphones can be used to ensure security

Biometric security authentication technology has been available for many years and adopted in many industries, including healthcare, to identify an individual’s name with a unique biological trait. This can include a fingerprint, iris scan, voice pattern, token or hand print, among other options.

Troubled Nuclear Builder Seen Best Fit for Asian Power Ambitions

If Japan’s Toshiba Corp. parts ways with its embattled U.S. nuclear unit, Westinghouse Electric Co., the likely buyer may be a regional neighbor with global ambitions. Westinghouse would be a strategic fit in China or South Korea, which are developing their own reactors for export, according to analysts and academics.

IBM Unveils Quantum Computing Plan

We just wanted to let you know that our site content is, of course, available to you absolutely free of charge. Our ads are the only way we have to be able to bring you the latest high-quality content, which is written by professional journalists, with the help of editors, graphic designers, and our site production and I.T. staff, as well as many other talented people who work around the clock for this site.

Apple, Samsung, Microsoft express concern about Central Intelligence…

“It lools like not only is [the Central Intelligence Agency arsenal] being spread around contractors and former American computer hackers for hire, but now maybe around the black market or being used by these American hackers who sometimes, you know cross both sides of the fence-they’re called grey hats-for attacking others”, Assange said . To Snowden, the biggest story about ” Vault 7 ” is that US intelligence services have purchased software vulnerabilities so it could use them to spy on people, when, in the interests of public safety, it should have turned over the information to the makers of the software.

WikiLeaks Offers to Shield Tech Firms from CIA Hacking Tools

WikiLeaks will work with technology companies to help defend them against the CIA’s hacking tools, founder Julian Assange said Thursday. The move sets up a potential conflict between Silicon Valley firms eager to protect their products and an intelligence agency stung by the radical transparency group’s disclosures.

DNAStorage

In a case of technology meets biology, scientists in labs across the country are experimenting with synthetic DNA as a storage medium, most notably Microsoft and the University of Washington. Engineers have successfully been pushing more storage into smaller spaces for decades, but that can’t go on forever.

WikiLeaks to provide tech firms access to CIA hacking tools: Assange

WikiLeaks has much more detailed information about CIA hacking techniques and will allow tech companies access so they can “develop fixes” before the information is more widely published, WikiLeaks founder Julian Assange said Thursday. The news conference took place at the Embassy of Ecuador in London, where he has been holed up since seeking asylum in 2012.

Human-less trucks are here

Tablet computer shows positioning of trucks and stutus of their communications , which is monitored by forward-looking radar sensors. Goal is to increase safety and fuel economy with vehicle-to-vehicle communication.

Child porn case dropped as US refuses to show software code

” Federal prosecutors have dropped child pornography charges against a Washington teacher after the U.S. Justice Department refused to disclose information about a software weakness it exploited during an investigation last year. In 2015, Michaud was arrested and accused of downloading child pornography.

The WikiLeaks CIA release: When will we learn?

This week’s WikiLeaks release of what is apparently a trove of Central Intelligence Agency information related to its computer hacking should surprise no one: Despite its complaints of being targeted by cyberattackers from other countries, the U.S. does a fair amount of its own hacking. Multiple federal agencies are involved, including the CIA and the National Security Agency , and even friendly nations.

Internet-connected ‘smart’ devices are dunces about security

These days, it’s possible to use your phone – and sometimes just your voice – to control everything from your TV to your lights, your thermostat and shades, even your car or medical device. But the WikiLeaks allegation that the CIA commandeered some Samsung smart TVs as listening devices is a reminder that inviting the “Internet of Things” into your home comes with some risk.

Nvidia announces Pascal-based Jetson TX2 COM

Nvidia’s Tegra X2 ‘Parker’-based Jetson TX2 is to launch later this month, the company has confirmed, offering a considerable performance boost over its Maxwell-based predecessor. Nvidia has announced the Jetson TX2 computer-on-module , featuring its Tegra X2 Parker system-on-chip processor and a claimed performance double that of its predecessor the Jetson TX1.

CIA hacking claims: How worried should you be?

Allegations that the U.S. agency has hacked into smartphones, laptops, and internet-connected TVs to spy on people around the world are enough to make anyone paranoid. But security experts are urging tech consumers to keep calm and take a few simple precautions.

Q&A-What do I need to know about the CIA’s hacking program?

WikiLeaks, the website that specializes in exposing secrets, on Tuesday released what it said were thousands of documents that described internal U.S. Central Intelligence Agency discussions on hacking techniques it has used to circumvent security on electronic devices for spying. Reuters could not immediately verify the contents of the published documents.

View Press Release

The research found deficits in both applied and hard tech skills among current employee circles and new applicants, and a general lack of preparedness for individuals entering the workforce with the right level of technical competency. “The tech skills gap is a well-known issue among both educators and employers,” said Alexandra Levit, chair of the Career Advisory Board.

IBM Building First Universal Quantum Computers for Business and Science

“IBM Q” quantum systems and services will be delivered via the IBM Cloud platform. While technologies that currently run on classical computers , such as , can help find patterns and insights buried in vast amounts of existing data, quantum computers will deliver solutions to important problems where patterns cannot be seen because the data doesn’t exist and the possibilities that you need to explore to get to the answer are too enormous to ever be processed by classical computers.

Why Raspberry Pi is the future of computing devices

On the strength of it new $10 Raspberry Pi Zero W, it’s hard not to look at the Pi and see the technology industry’s next wave. One of the most useful things about the smartphone is how many different technologies and tools it has consolidated into a single device that fits in your pocket.

Why I left Mac for Windows: Apple has given up

If you ask anyone who knows me, I’m probably the biggest Apple fan they know. Ask for a suggestion of what computer to get, and I’ll almost certainly either tell you the MacBook Pro, or to wait, because Apple is about to update its hardware finally.

Dell changes the economics of IOT with New Edge Gateway for Small Spaces

Dell Technologies, the broadest Internet of Things infrastructure solutions provider, today announced the new Dell Edge Gateway 3000 Series , offering customers flexibility, connectivity and real-time intelligence from harsh environments and small spaces. The 3000 Series includes three unique models targeted specifically for use cases and embedded solutions in the industrial automation, energy, transportation, and digital signage.

NCR Brings Omni-channel to Life at EuroShop 2017

NCR helps retailers address the most pressing needs in store transformation, unified commerce and digital enablement to implement their omni-channel strategies )–NCR Corporation, a global leader in omni-channel solutions, demonstrates at this year’s EuroShop how retailers can dramatically improve sales growth by using the right technologies. A recent Unified Commerce Landscape Report from NCR, in partnership with research and analyst firm IHL Group, found that retailers who invest in technologies designed to create seamless shopping experiences, personalization and store transformation enjoy sales boosts of up to 100 percent and more.

NCR Brings Omni-channel to Life at EuroShop 2017

NCR helps retailers address the most pressing needs in store transformation, unified commerce and digital enablement to implement their omni-channel strategies )–NCR Corporation, a global leader in omni-channel solutions, demonstrates at this year’s EuroShop how retailers can dramatically improve sales growth by using the right technologies. A recent Unified Commerce Landscape Report from NCR, in partnership with research and analyst firm IHL Group, found that retailers who invest in technologies designed to create seamless shopping experiences, personalization and store transformation enjoy sales boosts of up to 100 percent and more.

Digi International Enabling IoT in Space

Slightly after noontime on Monday, at an altitude of approximately 250 miles, the ISS will release a TechEdSat 5 , a cuboid-shaped device, approximately the size of a fire extinguisher. After a 30-minute time-period, Digi XBee modules, taking the place of wired connections, will begin to operate as the wireless “data-crossroads” between key components of the satellite.

‘Women of NASA’ Lego Set: Q&A with Creator Maia Weinstock

Maia Weinstock is the creator of the Women of NASA Lego set that the company recently announced it will be producing as part of its Lego Ideas program. Lego announced on Tuesday that it would be making a fan-created set called ” Women of NASA ,” featuring five important women who have worked for the agency.

Editorial: Teaching digital literacy at our library

While libraries have always promoted literacy in their communities, there are other fundamental skills that need to be emphasized in the 21st century. For example, the internet is becoming more indispensable every day – anyone who doesn’t know how to send an email or avoid websites that might load their computer with malware is at a severe disadvantage.