Like many of you I was fascinated by the Michael Cohen testimony last week in what was more performance art than fact-finding. It tends to be fascinating to watch disgruntled ex-employees testify, but they often aren't the most reliable witnesses. The personal nature of their termination tends to push them toward exaggeration, and many were fired for legitimate reasons...
It's no longer a question whether hackers will influence the 2016 elections in the United States -- only how much they'll be able to sway them. Leaked emails already have cost a Democratic Party chairperson her job, and the FBI last month issued a flash warning that foreign cyberadversaries had brea...
The Hyperloop -- the high-speed transportation concept Elon Musk has promoted heavily -- is edging closer to becoming a reality. Russia plans to develop a Hyperloop network for freight transportation, the country's transport minister announced Friday. MIT last week unveiled its Hyperloop Pod, a prot...
IBM last week announced that Lawrence Livermore National Laboratory has purchased its TrueNorth processor-based cognitive computing platform. The purchase included an end-to-end ecosystem and a multisocket host node. The lab will build a supercomputer based on the platform to see how neural networks...
A Chinese aviation and aerospace businessman last week pleaded guilty to participating in a conspiracy to steal sensitive military and export-controlled data from major U.S. defense contractors and send the information to China, according to the U.S. Department of Justice. Su Bin, also known as Step...
The Linux Foundation on Thursday announced that it's forming the OpenHPC Collaborative Project to push the software supply to support high-powered computing. The project will provide a new open source framework to meet HPC's unique application demands and parallel runtime requirements, the organizat...
A clandestine group of sophisticated Chinese hackers have infected scores of sites on the Web and stolen documents from industrial and government organizations with surgical precision, according to a Dell SecureWorks study released last week. Dubbed "Threat Group 3390," the cybergang has used infect...
With all the headlines about Internet cybersecurity breaches, there seem to be few headlines about the consequences for cybercriminals. That is because not all cybercriminals are caught, and when they are it often takes months, if not years, before trials. Even when the cybercriminals plead guilty,...
Google X Labs, the not-so-secret-but-secretive facility that works on cutting edge projects, has bought airborne wind turbine developer Makani Power, which announced the news on its website. Makani uses tethered aircraft that fly in figure 8s to generate power. The purchase formalizes a long and pro...
Technologically inclined businesses and other organizations have long enjoyed what I call IT "trickle down": Continuing, rapid development results in the mainstreaming of hardware, software and services that were originally unthinkably expensive and specialized. This doesn't mean that higher-end ...
Important to me so I can accept, deny, or customize my preferences before entering a website.
Inconvenient, but a fair exchange for knowing the website operator is likely serious about privacy and compliance.
An endless, unnecessary burden with a minimal effect that I wish was gone.
Enter your Username and Password to sign in.