Consumer & Gadgets

A web application to extract key information from journal articles

Academic papers often contain accounts of new breakthroughs and interesting theories related to a variety of fields. However, most of these articles are written using jargon and technical language that can only be understood ...

Computer Sciences

Exploring open-ended evolution in web services

Just like living ecosystems, web services form a complex artificial system consisting of tags and the user-generated media associated with them, such as photographs, movies and web pages. When drawing an analogy between biological ...

Security

Zoom goes big on fix for conferencing vulnerability

Settle down in a comfortable chair; breaks with cool washcloths are allowed. This is one of those Zero-Day stories with discoveries, responses, still newer discoveries and assorted updates.

Security

Using Bitcoin to prevent identity theft

A reaction to the 2008 financial crisis, Bitcoin is a digital-currency scheme designed to wrest control of the monetary system from central banks. With Bitcoin, anyone can mint money, provided he or she can complete a complex ...

Security

Learning to combat DDOS attacks

Denial of service (DOS) and distributed denial of service (DDOS) attacks on computer systems are a major concern to those charged with keeping online services running and protecting systems and those who use them. Such intrusions ...

Internet

Shining a light on the hidden shadows of the internet

The dark web began as an anonymous communication channel for the US government but is now a term used by the media and in Hollywood movies to refer to hidden online services where people primarily buy and sell items such ...

page 1 from 2