Even though Microsoft is actively pushing Windows 10, its market share is still far behind Windows 7. Did Windows 10 flop? How did things get this way?
Baggage loss in flights is still one of the biggest issue for airlines. Let’s see how new technology can help airlines stop losing your luggage.
A lot of high-end laptops or CPU/GPU coolers are using “vapor chamber” as a selling point. How is this better than the traditional cooling techniques? Let’s find out.
Yahoo submitted a patent for a “smart billboard” that uses demographics to show targeted ads to passerby. Is this “smart billboard” considered an invasion of privacy? Let’s find out.
With the rise of the Internet of Things, it is easier for botnets to carry out DDOS attacks. See how the IoT can become tomorrow’s botnets.
The United States has relinquished control of IANA to ICANN, effectively giving up its influential stake on the Internet. What does this mean? Did The U.S. just give up control of the Internet? Let’s find out!
Google releases software that can automatically generate a caption based on the objects and setting of an image. This may be a stepping stone towards something greater on the road to more advanced artificial intelligence.
Both AdBlock and Facebook consider each other a thorn in their side. But what do Facebook engineers do that frustrates AdBlock developers so much?
Governments are notorious for their inability to catch up to the latest advancements in technology. Here are four outdated systems in the IT infrastructures that are still around.
A proposal was put forth to establish an online court for claims totaling up to 25,000 pounds. Would this be beneficial or spell disaster for the country?
Many people like the convenience of NFC payment but are not aware of the potential risk behind it. There are a couple of things you should know before you hop onto the bandwagon of convenience that contact-less payments provide.
For an attack carried out over the Internet to be successful, the hacker behind it has to be clever. And nothing demonstrates wit more clearly than the “man in the middle attack”. It’s time to make people aware of what a “man in the middle” (MiM) attack is and some best practices that could prevent it from being carried out.
The words “privacy” and “security” are often used interchangeably. Understanding the difference can help you make more educated decisions on how you choose to share your information and what software you choose to use.
Many people are using ad blockers to block ads. The question is will publishers be hurt by ad blockers and will users suffer as well?
Is the growing presence of the Internet and computing technology in our lives a net benefit or hindrance to social interaction? Is technology isolating us? Let’s discuss.
Google is constantly facing litigation for unfair competition, so do you think Google is competing unfairly or it is clear of any wrongdoing?
Almost everything that has made human progress possible is thanks to something Google likes to call a “moonshot.” What exactly does it mean? Let’s find out.
One of the simplest approaches to security is air-gapping (disconnecting the system from the Internet entirely). But, is an air-gapped computer hacker-proof? Let’s find out.