Forty years after Apollo 11 landed on the moon, NASA open sourced the software code that ran the guidance systems on the lunar module.
By that time, the code was little more than a novelty. But in recent years, the space agency has built all sorts of other software that is still on the cutting edge. And as it turns out, like the Apollo 11 code, much of this NASA software is available for public use, meaning anyone can download it and run it and adapt it for free. You can even use it in commercial products.
Net neutrality is an incredibly important issue, but it’s hard to know what to pay attention to when people throw around jargon like “common carriers” and “reclassification.” It doesn’t help that people who tend to be united in their reaction — everyone from techno-libertarians to VCs – seem divided about the gutting of the FCC’s net neutrality rules this week.
The malicious program used to compromise Target and other companies was part of a widespread operation using a Trojan tool known as Trojan.POSRAM, according to a new report released Thursday about an operation that investigators have dubbed Kaptoxa The malware is a memory-scraping tool that grabs card data directly from point-of-sale terminals and stores it on the victim’s own system for later retrieval.
The thing to realize is that recreating human intelligence is impossible. We can’t even grasp how the brain works.
“Clearly, we can’t build a brain,” says Dharmendra Modha. “We don’t have the organic technology, nor do we have the knowledge.”
But Modha is trying to build one nonetheless, together with a vast team of researchers inside tech giant IBM and across various academic and government labs.
The business of DNA is undergoing a revolution. We can already get our genes scanned for the bargain-basement price of $99. Soon we’ll be able to have entire genomes sequenced for less than the cost of a MacBook Air. That’s huge considering that not so long ago it cost billions of dollars to map a single genome.
Disasters often strike without warning–and if you have family or friends who are in or near harm’s way, you’re going to want to get in touch. Unfortunately, that isn’t always so easy: Cell signals and land lines can be jammed with the massive amount of calls flowing in and out of an area. And in the case of today’s Boston Marathon tragedy, there are reports that cell service has been shut down altogether.
A critical vulnerability discovered in an industrial control system used widely by the military, hospitals and others would allow attackers to remotely control electronic door locks, lighting systems, elevators, electricity and boiler systems, video surveillance cameras, alarms and other critical building facilities, say two security researchers.
Google demands probable-cause, court-issued warrants to divulge the contents of Gmail and other cloud-stored documents to authorities in the United States — a startling revelation Wednesday that runs counter to federal law that does not always demand warrants.
The development surfaced as Google publicly announced that more than two-thirds of the user data Google forwards to government agencies across the United States is handed over without a probable-cause warrant.