This is a archive for Technology Update.
Using magnetic fields to remotely manipulate microparticle chains embedded in soft robotic devices, it is possible to gain control over Read More.
Using different light sources, a typical office scanner can end up infiltrated and a company’s network compromised, researchers said. “We Read More.
The transmission control protocol, or TCP, which manages traffic on the Internet, first ended up proposed in 1974 and to Read More.
With major reported data breaches last year hitting a record high and an average of one health data breach per Read More.
Rigged elections are top of mind across the United States after accusations have been flying since before and after the Read More.
When the Deepwater Horizon disaster struck almost seven years ago in the Gulf of Mexico, beginning the worst oil spill Read More.
Google’s new machine learning-based system to identify toxic comments in online discussion forums can end up bypassed by simply misspelling Read More.
Face images exist in databases all over like in driver’s license, passport, law enforcement, and employment, and they all end Read More.
Learning from nature and by using a little math, it may soon be possible to create a swarm of inexpensive, Read More.
IBM’s Watson AI and Internet of Things (IoT) supercomputer is taking on cybercrime. Over the past year, Watson has undergone Read More.