Humans

Every day, wild tales are told about the implications of artificial intelligence. It seems everyone has an opinion, and more questions are raised than answered. Will we be forced, one day, to swear fealty to our robot overlords? Is...

T-Mobile’s Proposal to FCC: Eliminate Unlicensed Use of 3.5 GHz...

In a last-minute attempt to eviscerate the core purpose of the rules governing the 3550-3700 MHz spectrum band (“3.5 GHz band"), T-Mobile USA, Inc....

IoT & Play – 3 Examples of How IoT is Transforming...

The reality of IoT is that the opportunities are practically endless when you start connecting things with things, humans with humans, and humans with...
Amazon's Whole Foods: Grocery Chains are F*cked

Amazon’s Whole Foods: Grocery Chains are F*cked

If you haven’t heard by now, Amazon just bought Whole Foods for a whopping $13.7 billion dollars. There’s been a lot of speculation about...
Hacking Startup Culture: Don’t Be Like Uber

Hacking Startup Culture: Don’t Be Like Uber

The headlines have been filled recently with Uber’s tales of HR woe, culminating with CEO Travis Kalanick being “asked” to leave the company. As...

All the IoT news you could ever ask for

Sign up for exclusive content

Data  - The Modern World’s Most Precious Resource

Data  – The Modern World’s Most Precious Resource

The Economist ran a story last week “The world’s most valuable resource is no longer oil, but data,” calling for new regulatory measures for the Internet giants. While it’s true that...
The 5 Worst Examples of IoT Hacking and Vulnerabilities in Recorded History

The 5 Worst Examples of IoT Hacking and Vulnerabilities in Recorded History

IoT hacking can be unbelievably effective. By leveraging thousands (if not millions) of insecure connected devices, hackers can produce DDoS attacks that can cripple our infrastructure, systems, and way of life. Or,...

Is IoT the End of the World?

“ are expanding skills, moving up the corporate ladder, showing awesome productivity and retention rates, and increasingly shoving aside their human counterparts”You might think — or hope, if you’re a nerd...
Machine Learning Just Made It Really Easy To Break Into Your Phone

Machine Learning Just Made It Really Easy To Break Into Your Phone

We’ve all seen movies and television shows where a hacker sprinkles powder on the pin pad to reveal latent fingerprints and guesses the passcode using the most pressed buttons. What if...

Bad Car Design Kills: Self-Driving Cars or Not

Wrecks caused by self-driving cars have gotten a lot of heat in the press lately, sparking debate on whether or not machines can be safer than humans. But bad car design,...
billgates

Bill Gates Doesn’t Actually Want To Tax Robots

Last week, Bill Gates made headlines when he said, “you’d think we’d tax the robot at a similar level .” This was spun on various news sites as “Bill Gates thinks we...

Digital Footprint – What Facebook Knows About Me

Earlier this year, DuckDuckGo, a search engine committed to protecting its users’ privacy, reported that the website received more than 14 million searches a day. That figure pales in comparison to...
Ring Door Bell

Huge Vulnerability Discovered in the Ring Doorbell

Last October, a botnet comprised of ~100,000 Internet of Things (IoT) devices, driven by a virus called Mirai, launched a DDOS attack against Dyn DNS. This attack disrupted service to several...

Your IoT Product Will Fail (Unless You Read This)

Many things go into a successful IoT product other than just connecting it to the internet and deeming it “smart”. To make your IoT product really take off, you need a...
You’re-Being-Sold-on-the-Internet

You’re Being Sold on the Internet

You’ve already read about the big data breaches at the DNC, retail stores, and even tech companies. Yet most people brush it off as if this is just a script for...