Consumer & Gadgets

A web application to extract key information from journal articles

Academic papers often contain accounts of new breakthroughs and interesting theories related to a variety of fields. However, most of these articles are written using jargon and technical language that can only be understood ...

Security

Zoom goes big on fix for conferencing vulnerability

Settle down in a comfortable chair; breaks with cool washcloths are allowed. This is one of those Zero-Day stories with discoveries, responses, still newer discoveries and assorted updates.

Computer Sciences

Exploring open-ended evolution in web services

Just like living ecosystems, web services form a complex artificial system consisting of tags and the user-generated media associated with them, such as photographs, movies and web pages. When drawing an analogy between biological ...

Security

Using Bitcoin to prevent identity theft

A reaction to the 2008 financial crisis, Bitcoin is a digital-currency scheme designed to wrest control of the monetary system from central banks. With Bitcoin, anyone can mint money, provided he or she can complete a complex ...