The Read/Write Metaphor Is a Flawed Way to Talk About DNA

The Read/Write Metaphor Is a Flawed Way to Talk About DNA

In his book Life at the Speed of Light , Craig Venter himself—the brash, iconoclastic scientist and entrepreneur, and the institute’s founder—described his project as the first “synthetic cell”; it was named Mycoplasma mycoides JCVI-syn1.0, but it acquired the nickname “Synthia.” You can tell a lot about a biotech application about the way it’s named (“noninvasive,” “de-extinction”), and Venter’s new cell is no different: its formal name highlights the merging of the biological and digital.

Coders’ Primal Urge to Kill Inefficiency—Everywhere

Coders’ Primal Urge to Kill Inefficiency—Everywhere

Adapted from " Coders : The Making of a New Tribe and the Remaking of the World," by Clive Thompson Penguin Press Oddities like the ramen optimizer have been part of Ho’s daily routines for years.

Facebook Can Make VR Avatars Look—and Move—Exactly Like You

Facebook Can Make VR Avatars Look—and Move—Exactly Like You

(They've since moved to a larger space on the Carnegie Mellon campus, with plans to expand again in the next year or two.) Codec Avatars, as Facebook Reality Labs calls them, are the result of a process that uses machine learning to collect, learn, and re-create human social expression.

The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source

The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source

(Like other open source code, though, expect it to have some bugs.) Joyce also noted that the NSA views the release of Ghidra as a sort of recruiting strategy, making it easier for new hires to enter the NSA at a higher level, or for cleared contractors to lend their expertise without needing to first come up to speed on the tool.

Hack Brief: Google Reveals 'BuggyCow,' a Rare MacOS Zero-Day Vulnerability

Hack Brief: Google Reveals 'BuggyCow,' a Rare MacOS Zero-Day Vulnerability

So like clockwork, 94 days after Google alerted Apple to a bug in its MacOS operating system that could allow malware to inject data into the most privileged code running on its computers, Mountain View's hackers are revealing that fresh zero-day vulnerability to the world.

How Facebook Has Changed Computing

How Facebook Has Changed Computing

"Facebook has been a driving force in open source for years, sharing many critical pieces of technology with the broader community." Jim Zemlin, executive director, Linux Foundation "They went beyond just cloning what Google and Amazon did and innovate, they did something different," says Jonathan Ellis, who used Cassandra extensively as a Rackspace employee and went on to co-found DataStax, a company that supports Cassandra for corporate clients, in 2010.

The Sensible Math of Knocking Over Absurdly Large Dominoes

The Sensible Math of Knocking Over Absurdly Large Dominoes

Since multiplication can be tedious after a while, let's make a computer program to calculate the height of the 29th domino assuming the starting domino is 5 millimeters tall. Here is a similar program that calculates the height of dominoes needed to get one big enough to possibly crush a car.

Space and Time Could Be a Quantum Error-Correcting Code

Space and Time Could Be a Quantum Error-Correcting Code

Ahmed Almheiri , Xi Dong and Daniel Harlow did calculations suggesting that this holographic “emergence” of space-time works just like a quantum error-correcting code.

The Future of Work: The Trustless, by Ken Liu

The Future of Work: The Trustless, by Ken Liu

I don’t know anything about her except that she and her family live across the hall from me, six people in a one-­bedroom.“Enjoying the fresh air?” I ask, more out of politeness than interest.“Sure,” she says, brushing her long black hair behind her ears and scooching aside to let me pass.

How Software Code Could Help You Grapple With the Legal Code

How Software Code Could Help You Grapple With the Legal Code

What you need, in other words, is your local zoning code, the body of all the laws and regulations related to land use in your area.Codification services like American Legal Publishing or Municode typically post legal codes online, but Glassmeyer says they're sometimes not searchable, making it harder for people to find what they're looking for.

Could Fallout 76 Really Spark a Class-Action Suit?

Could Fallout 76 Really Spark a Class-Action Suit?

Could Fallout 76 Really Spark a Class-Action Suit?If one law firm has its way, publisher Bethesda may need to pay for its alleged practices.BethesdaAfter a two-month glut of blockbusters leading up to the holiday shopping season, new releases are in a bit of a lull, which means there wasn't a lot left in gaming news this week beyond controversy, lawsuits, and ...

We Made Our Own Artificial Intelligence Art, and So Can You

We Made Our Own Artificial Intelligence Art, and So Can You

I decided to try them after talking with Barrat in the course of writing about self-taught AI experts in the December issue of WIRED, and learning that a Parisian art collective called Obvious used his recipes and code to create a work that sold at Christie’s for $432,500.Barrat makes art using artificial neural networks, webs of math that have spawned the recent AI boom by enabling projects like self-driving cars and automated cancer detection.

The Promise of (Practically) ‘Serverless Computing’

The Promise of (Practically) ‘Serverless Computing’

Ferguson, who spent decades as a software architect for companies including Dell and Microsoft and helped create IBM’s application server WebSphere, says this consumes more time than you might think. For the developer, the server is practically invisible.Ferguson says about 99 percent of Seeka TV's code runs on serverless platforms.

Capturing the Aftermath of Wildfires in France

Capturing the Aftermath of Wildfires in France

"The forest stands its ground, fights back, and survives," he says.Related StoriesLaura MalloneeThe 'Liquidators' Who Risked It All to Clean Up ChernobylLaura MalloneeHow That Magical Jack Dorsey–Alex Jones Photo HappenedLaura MalloneeA Cross-Country Road Trip, Courtesy of Google Street ViewFrance lost 60,000 acres to wildfires last year, most in the southern Mediterranean rim.

How Hackers Slipped by British Airways' Defenses

How Hackers Slipped by British Airways' Defenses

But the company later clarified that the compromised data included payment card expiration dates and Card Verification Value codes—the extra three or four-digit numbers that authenticate a card—even though British Airways has said it does not store CVVs. British Airways further noted that the breach only impacted customers who completed transactions during a specific timeframe—22:58 BST on August 21 through 21:45 BST on September 5.These details served as clues, leading analysts at RiskIQ and elsewhere to suspect that the British Airways hackers likely used a "cross-site scripting" attack, in which bad actors identify a poorly secured web page component and inject their own code into it to alter a victim site's behavior.

Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob

Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob

But if owners of a Model S manufactured before then don't turn on that PIN—or don't pay to replace their key fob with the more strongly encrypted version—the researchers say they're still vulnerable to their key-cloning method.Keys to the KingdomLike most automotive keyless entry systems, Tesla Model S key fobs send an encrypted code, based on a secret cryptographic key, to a car's radios to trigger it to unlock and disable its immobilizer, allowing the car's engine to start.

15 Best Tech & Gaming Deals: Switch, Fire HD, Roomba, PS4 DualShock

15 Best Tech & Gaming Deals: Switch, Fire HD, Roomba, PS4 DualShock

If your device can wirelessly charge with the Qi standard, use the code WIRELESSPAD at checkout to get the discount.Amazon Echo Show for $130 (Was $230).