Cyber Security 25% of Federal Agencies Have Yet to Start Compulsory DMARC Compliance Journey, Researchers Find… Jul 26, 2018 There is a saying that “security is a process, not a destination.” It means organizations can’t fulfill their information security responsibilities…
Artificial intelligence Computer vision researchers build an AI benchmark app for Android phones – Info AI Jul 26, 2018 A group of computer vision researchers from ETH Zurich want to do their bit to enhance AI development on smartphones. To wit: They’ve created a…
Analytics A bug in macOS’ “Quick Look” feature leaks encrypted data, researchers find… Jul 25, 2018 (Image: ZDNet)A bug in macOS can expose the contents of a user's files -- including document…
Robotics Researchers develop electronic skins that wirelessly activate fully soft robots – Info Robotic Jul 25, 2018 …
Cyber Security Researchers Can Earn Up to $100K via Microsoft Identity Bounty Program – Info CCrime Jul 25, 2018 Microsoft announced its Identity Bounty Program through which security researchers can earn up to $100,000 for an eligible submission. On 17 July,…
Robotics Researchers use micro-robots to carry cells to a target site in live animals – Info Robotic Jul 25, 2018 <a…
Artificial intelligence Microsoft Researchers Build a Bot that Draws – Info AI Jul 25, 2018 If you’re handed a note that asks you to draw a picture of a bird with a yellow body, black wings and a short beak, chances are you’ll start with a…
Robotics Researchers unravel more mysteries of metallic hydrogen – Info Robotic Jul 24, 2018 Posted: Jul 23, 2018(Nanowerk News) Metallic hydrogen is one of the rarest materials on Earth, yet more than 80 percent of…
Artificial intelligence Sundar Pichai is Surrounded by Google Brain Researchers – Info AI Jul 23, 2018 If you want to understand the priorities of a technology company, first look at the seating chart. At Google’s Silicon Valley headquarters, the…
Software Designing Working with External User Researchers: Part II – Info Soft Design Jul 23, 2018 In the first installment of the Working with External User Researchers series, we explored the reasons why you might hire a user…