In this TED talk, Mikko Hypponen tells us about–and shows us–a variety of malware species, from the earliest PC viruses to today’s high-tech organized crime menace.
[ted id=1192]
Category: Chapter 10 Computer Security and Risks
This year Watson, an IBM computer, beat two champions on TV’s Jeopardy. This PBS Nova program goes behind the scenes and explains how Watson’s creators pulled it off.
This summer some consumers will be able to pay for some of their purchases by waving their phones instead of swiping their cards. Google Wallet is an Android App that uses near-field communication technology to send transaction information from phone to merchant terminal. This kind of technology could eventually change the way we do most of our face-to-face shopping.
This New York Times article includes a demo video.
The_Green_IT_movement_has_lost_the_plot
Who owns your data? If somebody else collects information about you, should you have the legal right to see and use that information? New York Times Columnist Richard Thaler argues that consumers and businesses alike would benefit from laws ensuring that you have access to your information.
Read on New York Times site
[ted id=1091]