The 3D E-Commerce Revolution
We are now living in a time when customer expectations are changing particularly fast, and retailers that can't keep up get left behind. A consumer who enjoys the online shopping experience at an..
We are now living in a time when customer expectations are changing particularly fast, and retailers that can't keep up get left behind. A consumer who enjoys the online shopping experience at an..
The Mobile World Congress is the annual event where everyone who hates Apple goes to grouse about their profits and point out Apple's lack of real progress. That's pretty much everyone who i..
The FIDO Alliance hammered another nail into the passwords coffin with the announcement that devices running Android 7.0 or higher will be compatible with FIDO2. Certification of Android 7.0+ means de..
A new cryptovirus called “B0r0nt0K” has been putting Linux and possibly Windows Web servers at risk of encrypting all of the infected domain's files. The new ransomware threat and the ransom of 2..
Microsoft CEO Satya Nadella has defended the company's $479 million contract with the U.S. military — a commitment that some Microsoft employees strongly opposed. While pledging to engage with e..
Predicting the power output of wind farms has been challenging, but it's becoming less so with the use of machine learning. Google and British artificial intelligence company DeepMind have been u..
Learning to code, regardless of the path a child chooses to take, is crucial today. Research shows us that this knowledge will be important in any career. As both a female leader in technology and a m..
Like many of you I was fascinated by the Michael Cohen testimony last week in what was more performance art than fact-finding. It tends to be fascinating to watch disgruntled ex-employees testify, but..
EasyOS is an experimental Linux distribution that either will renew your passion for using something different or leave you disappointed in its oddball approach to computing. EasyOS is a blend of the ..
Facebook has undermined privacy on its network by exposing mobile phone numbers provided to secure user accounts through two-factor authentication. That's because anyone can use the numbers to lo..