The Atlantic: Hacking the President’s DNA
growth is a slow, sequential proposition (1 becomes 2 becomes 3 becomes 4, etc.), exponential growth is an explosive doubling (1 becomes 2 becomes 4 becomes 8, etc.) with a…
growth is a slow, sequential proposition (1 becomes 2 becomes 3 becomes 4, etc.), exponential growth is an explosive doubling (1 becomes 2 becomes 4 becomes 8, etc.) with a…
…as the fundamental nature of the computer shifts, so too does the threat landscape. To most, a computer is a desktop machine, laptop or server. More recently, we have come…
coming years, not only will every computer, phone and tablet be online, but so too will every car, house, dog, bridge, tunnel, cup, clock, watch, pacemaker, cow, streetlight, bridge, tunnel,…
Remote-controlled aircraft and robot technology can be used for bad just as easily as for good. Americans know their government uses unmanned aerial vehicles (UAVs), or drones, on military and…
…corporations capable of gleaning new and powerful insights into their customers and the marketplace. Storage has become cheap and companies are processing and generating volumes of data that would have…
…that most people search every day. Yet it’s almost completely out of sight. According to a study published in Nature, Google indexes no more than 16 percent of the surface…
company facing a looming shutdown desperately turned to the general public to help solve a critical business problem. The company, Goldcorp, was so frustrated with the inability of its own…
becoming one as tiny computers are increasingly being integrated with our own human physiology. In the United States alone, more than 2.5 million people rely upon IMDs and like devices…
© 2024 Marc Goodman All Rights Reserved.