WhatsApp Is at the Center of Coronavirus Response

WhatsApp Is at the Center of Coronavirus Response

For the 2 billion of those people who also use the encrypted communication service WhatsApp, now more than ever is a time for calling, messaging, and seeking trustworthy information.Cathcart says WhatsApp's priority, even more so during the pandemic, is to elevate accurate information and support fact-checking organizations around the world.

Did Twitter Help Stop War With Iran?

Did Twitter Help Stop War With Iran?

The “MOLINK” communication system, as it’s known in military parlance, was used for the first time during another Middle Eastern crisis, the Arab-Israeli Six-Day War, when President Lyndon Johnson and Soviet Premier Alexei Kosygin exchanged 19 messages, explaining each of their respective actions to ensure that the two superpowers didn’t get drawn into the regional conflict.

Google Is Finally Rolling Out its Own RCS in the US

Google Is Finally Rolling Out its Own RCS in the US

The only power RCS has comes from the fact that your carrier might do it, which would instantly upgrade the baseline messaging service it offers on (at least new) phones.

The Tech Helping Dogs Learn to 'Talk' With Humans

The Tech Helping Dogs Learn to 'Talk' With Humans

But then the dog reaches around and his mouth tugs something on the yellow vest he’s wearing, and you hear it again.“My owner needs your attention!

The Myth of Technophobia

The Myth of Technophobia

Written more than 2,300 years before the invention of the iPhone , Plato’s The Phaedrus includes what has become one of the most weaponized examples of reactionary techno-skepticism.

The False Promise of “Lawful Access” to Private Data

The False Promise of “Lawful Access” to Private Data

Terrorists should not feel free to upload terrible images of slaughter, but neither should they be empowered to empty people’s bank accounts or to tap the phones of presidents and prime ministers.“But,” people say, “What if only legitimate requests can get into the protected communications?” Weaknesses in computer systems are discovered by attackers all the time.

The Government Shutdown Killed an Artist's Space Sculpture

The Government Shutdown Killed an Artist's Space Sculpture

According to the release put out by the Nevada Museum of Art, after the satellite was deployed it successfully established communication with ground stations on Earth, but the sheer number of satellites being deployed meant the Air Force was “unable to distinguish between [the satellites] and could not assign tracking numbers to many of them.” Without a NORAD tracking ID, the FCC wouldn’t give the okay to Paglen’s team to deploy the reflective balloon contained in the satellite.

How to Land a Plane in 'Non-Normal' Situations

How to Land a Plane in 'Non-Normal' Situations

Now it’s time to navigate a safe flight path (in relation to mountains, storms, air traffic zones, and other aircraft) and communicate with the folks who need to know what you’re doing, or who can help you to achieve a safe outcome.

Audi Cars Tell You How Fast to Go to Catch All Green Lights

Audi Cars Tell You How Fast to Go to Catch All Green Lights

The Green Light Optimization Speed Advisory system is an expansion of Audi’s vehicle-to-infrastructure communication system: Since 2016, it has offered “time-to-green,” which tells the driver sitting at a red light how long they have to look at their phone before it’s time to go.

Children Are Using Emoji for Digital-Age Language Learning

Children Are Using Emoji for Digital-Age Language Learning

Here's a string of animals and hearts from a three year old:🦄🐴🦋🐛🐤🐦🐦🐧🐔🐣🐶🐱🐭🐰🐰🐰❄️❄️🌦🌈🔥💥☀️🍓🥞❣️💙💚💛🧡🔒💕💜🖤💞💞💗💖💘🕉💝☸️💟These emoji texts are adorable, but as a linguist, I'm interested in what kids are trying to communicate.

It's Not a Myth: Quantum Messages Really Can Travel Faster

It's Not a Myth: Quantum Messages Really Can Travel Faster

“We are the first to show a quantum advantage for transmitted information that two parties have to share to perform a useful task,” said Eleni Diamanti , an electrical engineer at Sorbonne University and a co-author of the result along with Iordanis Kerenidis , a computer scientist at Paris Diderot University, and Niraj Kumar .

Hacking Diplomatic Cables Is Expected. Exposing Them Is Not

Hacking Diplomatic Cables Is Expected. Exposing Them Is Not

It is news that they totally got caught, though," says Dave Aitel, a former NSA researcher who is now chief security technology officer at the secure infrastructure firm Cyxtera.In the attack Area 1 identified, hackers first breached the European communication network known as Coreu in April 2015, and actively exfiltrated data until last week.

The 19th Century Argument for a 21st Century Space Force

The 19th Century Argument for a 21st Century Space Force

Security experts warn that Russia and China are both catching up and developing anti-satellite weapons capable of tripping up America’s strategic orbital foothold.The fourth thing to know about space power is, if America gives up its military dominance, expect its economic influence to wane as well.

PPP Cancellations: If you do not change direction, you may end up where you are heading (Lao Tzu)

PPP Cancellations: If you do not change direction, you may end up where you are heading (Lao Tzu)

In a previous blog, I used the metaphor of marriage to explore the dynamic of public-private partnerships (PPPs) as relationships created between two parties with often very different expectations and methods of communication.