Related topics: google · china

Study says smartphones are eroding personal privacy

Private v. public, virtual v. real have converged in a world saturated by information technology. It seems impossible to divide the public from the personal. But when and where do we choose to share information about ourselves? ...

Robo-dogs to the rescue

Scientists in Japan have developed a system using information technology to augment and enhance the capabilities of canine search and rescue (SAR) teams. Outfitted with special suits, these cyber-enhanced SAR dogs can transmit ...

Protected Majorana states for quantum information

Quantum technology has the potential to revolutionize computation, cryptography, and simulation of quantum systems. However, quantum physics places a new demand on information processing hardware: quantum states are fragile, ...

Wage gap linked to high school subject choices

A University of Melbourne study of high school subject choices reveals that girls are less likely to choose science, technology, engineering or mathematics (STEM) subjects than boys, despite many girls testing better in these ...

Pentagon plans huge, swift upgrade to Windows 10

The Department of Defense is embarking on a program to update millions of its computers to Windows 10, an unusually quick move for one of Microsoft's massive government customers.

Protecting data assets with two-factor authentication

To better protect the Institute's data – including employee data – from future cyber risks, the Office of Information Technology (OIT) will begin deploying two-factor authentication to early adopters across campus in ...

Why a famous technologist is being branded a Luddite

On December 21, the company SpaceX made history by successfully launching a rocket and returning it to a safe landing on Earth. It's also the day that SpaceX founder Elon Musk was nominated for a Luddite Award.

page 25 from 40