Skip to main content

"security"

How to Reconcile Big Data and Privacy

In many ways "big data" and "encryption" are antithetical. The former involves harvesting, storing and analyzing information to reveal patterns that researchers, law enforcement and industry can use to their benefit.

March 6, 2014 — Larry Greenemeier

The Day the World's ATMs Stood Still--or Didn't

You're probably on tenterhooks wondering what will happen to your reliable, convenient ATM on April 8, the day Microsoft officially sticks a fork in its hugely popular Windows XP operating system.

April 7, 2014 — Larry Greenemeier
GMO Labeling Debate Follow-up

GMO Labeling Debate Follow-up

There was a pretty huge response to my take on the GMO labeling debate last Friday. At the time of writing, there are 37 comments (for comparison, my other posts here have had between 0 and 4 comments), and I had a couple of convergent conversations on twitter and google+.

November 11, 2013 — Kevin Bonham

Food Security and the Fight Against HIV/AIDS

The relationship between HIV/AIDS and food security is incredibly complex. For this guest post, I invited two experts on this issue to share their knowledge, insight, and experience.

April 22, 2014 — Layla Eplett

The Super Bowls Super Security Boat

The Super Bowl poses mammoth security challenges in any given year. This years championship gamethe first since last Aprils Boston Marathon bombingraises the stakes by bringing the game, which the Department of Homeland Security designates a Level One national security event, to New Jerseys MetLife Stadium.

January 29, 2014 — Larry Greenemeier
A Survey Asks: How Much Does Your Privacy Online Matter?

A Survey Asks: How Much Does Your Privacy Online Matter?

Is online anonymity important to you? How far are you willing to go to protect your privacy? These two the key questions are examined in a report released Thursday by the Pew Research Center’s Internet & American Life Project.

September 5, 2013 — Larry Greenemeier

How to Disappear from the Web

If you've ever been the victim of identity theft, or a stalker, or you just value your privacy, Tech Talker has the tools to help you ditch the digital age and remove your presence from the web.

June 25, 2014 — Tech Talker Eric Escobar

3 Projects Prove Privacy Is Not Dead

Web and mobile phone users willingly share personal data in exchange for free stuff, but not everyone is ready to throw in the towel on privacy

July 22, 2014 — Larry Greenemeier
Country of imports – a closer look at Luxembourg’s energy sector

Country of imports – a closer look at Luxembourg’s energy sector

In the U.S., much of the energy dialogue has been around the inherent risk in depending on other countries to meet its energy needs. But, in Luxembourg – a country that imports essentially ALL of its energy supply – “energy security” takes an even more prominent role.

July 30, 2014 — Melissa C. Lott
The Smart Approach to Development: Incorporate Science

The Smart Approach to Development: Incorporate Science

How can science deliver solutions to global development problems? That was the question before us at one of the panels I moderated during the World Economic Forum’s Annual Meeting of New Champions 2013, or “Summer Davos,” the week of September 9 in Dalian, China.

September 18, 2013 — Mariette DiChristina