Techmeme

Results 1 - 10 of about 2314:

Cade Metz / Wired:
Facebook and Microsoft partner to lay highest capacity transatlantic internet cable yet, connecting Virginia and Spain with a bandwidth of 160Tbps   —  Facebook and Microsoft are laying a massive Internet cable across the middle of the Atlantic.  —  Dubbed MAREA—Spanish for “tide” …
May 26, 2016, 5:25 PMIn context
Andy Greenberg / Wired:
Researchers demonstrate ability to pinpoint users of Grindr, other gay dating apps with “colluding” trilateration attack   —  A few days ago, I warned my wife that the experiment I was about to engage in was entirely non-sexual, lest she glance over my shoulder at my iPhone.
May 21, 2016, 6:15 AMIn context
David Pierce / Wired:
Inside Project Ara, Google's quest to create a modular smartphone   —  The building that houses Google's Advanced Technology and Products division offers a few subtle hints that something weird is going on inside.  The pirate flags in the bathroom.  The big sign reminding ATAP employees …
May 20, 2016, 6:35 PMIn context
Kim Zetter / Wired:
Chelsea Manning filed an appeal this week to have her case dismissed or sentence reduced to 10 years   —  Imprisoned WikiLeaks whistleblower Chelsea Manning filed an appeal this week, three years after she was sentenced to 35 years in prison for what is still considered the largest leak of classified government documents in history.
May 20, 2016, 5:25 PMIn context
Kevin Poulsen / Wired:
Profile of Maksym Igor Popov, a Ukrainian hacker turned FBI mole who later tried to scam EMC, AT&T, and the FBI   —  I'm sorry; your browser does not support HTML5 video in WebM with VP8 or MP4 with H.264.  —  Typography by Michiel Schuurman  —  O  —  One Thursday in January 2001 …
May 15, 2016, 6:05 AMIn context
Davey Alba / Wired:
YouTube tests letting users share and talk about videos in group message threads within the app, which others can be invited to join   —  We've all had it happen: You're talking with a friend, and the conversation turns to something that a YouTube video perfectly encapsulates.
May 11, 2016, 3:10 PMIn context
Brian Barrett / Wired:
How IBM researchers are teaching Watson to analyze and identify cybersecurity threats in the hope of launching to enterprise customers this year   —  IBM's Watson supercomputer hardly needs any more resumé-padding.  It's already won Jeopardy, written a cookbook, and dabbled in revolutionizing healthcare.
May 11, 2016, 9:55 AMIn context
Cade Metz / Wired:
IBM makes its five-qubit quantum computer available as a cloud service for students and researchers to test   —  IBM Is Now Letting Anyone Play With Its Quantum Computer  —  Quantum computing is computing at its most esoteric.  It's an experimental, enormously complex …
May 4, 2016, 12:55 AMIn context
Andy Greenberg / Wired:
Bitcoin Foundation chief scientist Gavin Andresen, who visited Wright in person to see additional evidence, remains convinced Wright is Satoshi   —  How Craig Wright Privately ‘Proved’ He Created Bitcoin  —  When rumors surfaced early last month that Australian cryptographer Craig Wright …
May 2, 2016, 3:25 PMIn context
Kim Zetter / Wired:
A guide to mobile data network SS7 and its vulnerabilities, which can be exploited to track cell phone users and intercept their communications   —  The Critical Hole at the Heart of Our Cell Phone Networks  —  In February 2014, the US ambassador to Ukraine suffered an embarrassing leak.
May 1, 2016, 8:35 PMIn context

Sponsor Posts

Microsoft:
How digital artist Gabriel Pulecio ‘traps infinity’ and creates beehives of light  —  His motion graphics are controlled pieces, dictated by software and digital design.  He uses Kinect to create interactivity, a key component in his work.
Zoho:
Power up your Sales Analytics using Cohort Analysis  —  A cohort is a group of subjects who share common characteristics in a given time span.  Cohort analysis breaks down the data from a given dataset …
Worldpay:
Digital subscriptions have taken off!  —  Convert more subscribers and process more payments with these best practices.
HackerOne:
You Received A Vulnerability Report, Now What?  6 Steps to Resolution  —  When you discover a vulnerability, fixing it is not just a matter of applying a quick patch to solve the immediate problem.