Trust issues plague bitcoin and other digital currencies. Licensed exchanges could change that
An air safety expert talks about automated cockpits and when, if ever, commercial aircraft will be piloted remotely
Scientific American contributor Keren Elazari argues in a 2014 TED talk that securing cyberspace is impossible without the help of hackers.
Virtual currencies such as bitcoin rely on this digital public ledger system to guard against fraud, an approach that could likewise secure the coming Internet of things
The common fear is that intelligent machines will turn against humans. But who will save the robots from one another, and from us, one academic asks
DJ Patil talks about how to get more out of public and private information while protecting that data from abuse
Visual notes from the Science of Learning panel at South by Southwest EDU (SXSWedu)
The world’s undersea network of transoceanic cables serves as the cardiovascular system for data coursing through the Internet and other communications, but not without a lot of human help...
A scientist known as the "Captain of Moonshots" talked at SXSW this week about Google X's biggest flops and lessons learned
Daniel Dennett and Deb Roy explain why digital technology will drive organizations into an evolutionary arms race
In this excerpt from his new book, The Innovators, Walter Isaacson explores the origin of new technologies and the nature of new ideas
Brainlike computer chips, smart pharmacology and other advances offer great promise but also raise serious questions that we must deal with now
The Magnetospheric Multiscale mission's four satellites are designed to study the phenomenon responsible for powerful bursts of powerful magnetic particles
There are more pragmatic than pernicious reasons why a government official would want to use personal e-mail and their own server
As messaging services eat into e-mail, what are we losing—and gaining?
Analyze real cancer data by playing a mobile game
Digital security specialist Bruce Schneier’s latest book examines the repercussions of—and the appropriate responses to—ubiquitous corporate and governmental harvesting of personal data...
Gen. John Hyten, Commander, U.S. Air Force Space Command, talks about the task of tracking all the materials in orbit and keeping them from crashing into one another. Steve Mirsky and Larry Greenemeier report
Broadband Internet access will be reclassified as a telecom service under a modified set of rules. Court battles and more Congressional hearings to follow
If Americans recycled the 130 million cellphones thrown away every year, enough energy to power 24,000 homes could be saved