Editorial

Game of phones design: when will we benefit from futuristic models?
Editorial Game of phones design: when will we benefit from futuristic models?

With all the surveys on how smartphones are taking over the digital environment and become the main type of user terminals, surpassing all others in popularity and usability, combined with the marketing craze surrounding each new phone launch, we might think we are at the utmost peak of innovation

What does reasoning like humans mean for AI?
Editorial What does reasoning like humans mean for AI?

Reasoning (as a human ability) is innate and involves the capacity of assessing ordinary situations, probabilities and possible outcomes in order to make decisions or to determine further steps for derived actions. While humans inherit and develop the reasoning mechanism, the programmers involved

Navigate your way through seven of the best navigation apps
Editorial Navigate your way through seven of the best navigation apps

It seems that GPS navigation – such an important, universally identical service – should have equally simple yet efficient mobile applications. Live maps and a comfortable interface, adapted to the mobile OS – what more can a user request? Yet, when ranking the best navigation apps, it seems very ha

Would you want Facebook to share its marketing revenue with users?
Editorial Would you want Facebook to share its marketing revenue with users?

The news? Perhaps you already know, but Facebook is considering monetizing posts in a different way – one that would make post authors benefit from their own content (or from their proprietary content). The source? The Verge found out that this move is rather close via a user survey distributed m

What do you know on LangSec?
Editorial What do you know on LangSec?

Language-theoretic security or LangSec is a cyber-security approach that aims at eliminating cyber-risks from their programming roots. From this new perspective, all Internet cyber-risks originate in ad-hoc programming and untrusted inputs that form layer upon layer of coding with potential

When dangers lay dormant in your wireless peripherals
Editorial When dangers lay dormant in your wireless peripherals

It is an element of progress to have our mouse of keyboard wirelessly communicating with the computer, but have you ever wondered what dangers lie dormant in this efficient technology? A pair of Bastille researchers decided to verify just how vulnerable remote peripherals are to malicious attacks –

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later