Staff pick
Popular Trailers
Action / Adventure
Google found itself in the crosshairs of government regulators Tuesday as the U.S. Justice Department filed a civil lawsuit against the tech giant for unlawfully maintaining a monopoly in online search services and in search advertising. "This is a monumental case for the Department of Justice and, more importantly, for the American consumer," U.S. Attorney General William P. Barr said in a statement.
Healthcare records were digitized to help prevent medical errors such as misdiagnoses nd mistakes with medication, but electronic health records have made it easier for bad actors to steal patients' highly personal information. Cybercriminals are further motivated by the fact that patient medical records are worth up to 10 times more than credit card numbers on the Dark Web.
A warning by Facebook and Google that they may have to curb service to Australia if a controversial law takes effect this year has the Aussies reviewing their options, including setting up a publicly-funded social network. The idea was floated in a report titled "Tech-Xit: Can Australia survive without Google and Facebook?"
We could build homes that stand up to hurricanes, earthquakes, floods, and other disasters. We could build cars that are lighter and more fuel-efficient. Like the opening for the old TV show, "The Six Million Dollar Man," we have the technology. So why don't we use it? The reason is that people who build homes, cars, and other things would need to be retrained -- but the result would be a more sustainable and safer world.
The Big Tech companies have arguably done what they want over the years, arousing consumer anger and distrust, and numerous complaints by privacy and consumer rights groups. That includes cocking a snook at governments. While all of the Big Tech firms have been hit with multimillion-dollar fines at one time or another, many argue that's a drop in the bucket for companies that rake in billions of dollars annually.
Microsoft has aggressively updated its new Chromium version of the Edge browser with several features that should help you find gifts and save money while remaining safer on the web. Let's talk about these improvements to Edge this week, and we'll close with a new notebook from Gateway, which appears to have the near-perfect blend of size, price, and performance for our new COVID-19 normal.
RoboLinux is one of the most advanced desktop Linux distributions you can find. The latest release is even better, making it potentially THE best Linux variety available today for desktop users. The Oct. 9 release of RoboLinux 11.13 is an upgraded build of the project's Ubuntu-based distribution. But wait, there is a whole lot more to RoboLinux than just another Ubuntu-based retread.
Drones are now commonly used for aerial photography and videography, to cover live events, deliver small items, and to survey dangerous places and situations. While some companies maintain their own drone force, others prefer to outsource their use of drones to service providers that deal with the regulatory and legal issues that crop up with the commercial use of UAVs.
Welcome to the new phenomenon of playing Zoom poker. It is a novel idea that is catching on as the pandemic continues. The video platform has become a popular solution for friends who miss their regular in-person poker games. It adds the missing element of banter and social interactions that playing cards and other table games alone on a computer just cannot provide.
We're moving at an impressive rate to create virtual worlds, but we have missed several critical elements. Now HP has taken a considerable step to usher us to a future where we really can mostly exist in a virtual, rather than real, office environment; and not only get more done, but be safer as well.
The United States Defense Innovation Board has recommended that the Pentagon hire civilians to work from home who can handle classified information as a way of attracting people with technology expertise. The individuals sought "will have technical degrees and/or highly specialized skills in digital technologies and innovation needed across the U.S. Department of Defense," which is undergoing digital transformation.
Instead of legacy security models that differentiate a "trusted" interior from an untrusted external one, zero trust instead assumes that all networks and hosts are equally untrustworthy. Once this fundamental shift in assumptions is made, you start to make different decisions about what, who, and when to trust, and acceptable validation methods to confirm a request or transaction is allowed.
Earlier this month, a woman with a life-threatening condition passed away after hackers crashed the IT systems of a major hospital in the city of Dusseldorf. Incidents like this raise the question of why corporations do not patch vulnerabilities as soon as software manufacturers issue a fix.
Show more movies