Nvidia's Arm Deal Would Make It the Center of the Chip World

Nvidia's Arm Deal Would Make It the Center of the Chip World

Arm, located in Cambridge, England, licenses designs known as instruction-set architectures for central processing unit (CPU) chips, an alternative to those made by Intel , to companies including Apple, Google, Amazon, and Huawei.Only recently have some companies, including Amazon , begun adapting Arm’s designs to make more efficient new data center chips.

Is Your Chart a Detective Story? Or a Police Report?

Is Your Chart a Detective Story? Or a Police Report?

Consider the visualization created by information designer Will Burtin in 1951 to summarize the effectiveness of three antibiotics—penicillin, neomycin, and streptomycin—in treating 13 bacteria.This understanding of visualization design as a form of model selection, and one that highlights certain comparisons, can be very useful.

A Plan to Make Police Data Open Source Started on Reddit

A Plan to Make Police Data Open Source Started on Reddit

On May 18, Kristin Tynski dropped a link into the Reddit community r/privacy: “I scraped court records to find dirty cops.” Tynski, who owns a marketing firm, had collected the public police records in Palm Beach County, where she lives, and wrote up her findings on data like traffic citations and race.

A Report Blames ‘CIA Failures’ for the Agency's Worst Hack

A Report Blames ‘CIA Failures’ for the Agency's Worst Hack

"The lax cybersecurity practices documented in the CIA's WikiLeaks Task Force report do not appear to be limited to just one part of the intelligence community," Wyden wrote.

Dating Apps Exposed 845GB of Explicit Photos, Chats, and More

Dating Apps Exposed 845GB of Explicit Photos, Chats, and More

And though the exposed data included limited "personally identifying information," like real names, birthdays, or email addresses, the researchers warn that a motivated hacker could have used the photos and other miscellaneous information available to identify many users.

Inside the NSA’s Secret Tool for Mapping Your Social Network

Inside the NSA’s Secret Tool for Mapping Your Social Network

One of those documents, the first to be made public in June 2013, revealed that the NSA was tracking billions of telephone calls made by Americans inside the US.

Now’s The Perfect Time to Start Using a Password Manager

Now’s The Perfect Time to Start Using a Password Manager

And yes, the best password managers cost money (although some good ones are free , or have a free tier), but consider this: The cost of a password manager is likely less than you'd spend trying to recover a breached account that contains all of your personal data, or what you'd spend on a subscription to an identity theft service.

Adult Cam Site CAM4 Exposed 10.88 Billion Records Online

Adult Cam Site CAM4 Exposed 10.88 Billion Records Online

“Leaving their production server publicly exposed without any password,” says Safety Detectives researcher Anurag Sen, whose team discovered the leak, “it’s really dangerous to the users and to the company.”.

Early Remdesivir Data for Covid-19 Is Finally Here

Early Remdesivir Data for Covid-19 Is Finally Here

In late January and early February, as the novel coronavirus that causes Covid-19 began to spread outside of China , Andre Kalil was spending more and more time inside his office at the University of Nebraska Medical Center in Omaha on the phone and emailing with researchers at the National Institutes of Health.

Birds that Carry Lit Candles & The Importance of Avian Innovation

Birds that Carry Lit Candles & The Importance of Avian Innovation

It may seem like a bit of conjecture – avian innovations resulting in species longevity – but Simon Ducatez, a post-doctoral researcher in Barcelona and McGill University and Louis Lefebvre, a Canadian professor of biology at McGill, have arrived at the conclusion scientifically.

India's Data Protection Bill Threatens Global Cybersecurity

India's Data Protection Bill Threatens Global Cybersecurity

It is in the clear interest of policymakers, organizations, and the public to receive feedback from security researchers directly, instead of risking the information reaching other potentially malicious parties.

All the Ways Facebook Tracks You—and How to Limit It

All the Ways Facebook Tracks You—and How to Limit It

The social network behemoth says it uses your data to show relevant ads and keep you safe; if someone signs into your account from a country you're not usually in, for instance, Facebook can flag the activity as suspicious.The best way to limit Facebook's tracking is to quit all three apps for good.

Personal Data Is Valuable. Give Pricing Power to the People

Personal Data Is Valuable. Give Pricing Power to the People

So, for a data market to succeed, individual data creators—whether enterprises or consumers—will need tools to set their own privacy terms and conditions.

Everything You Need to Know About the CCPA

Everything You Need to Know About the CCPA

But as the mechanisms of the law get finalized, and depending on how it’s enforced, its impact could go a long way to determining whether the 2020s become the decade when the US started taking privacy seriously.

The Irishman Gets De-Aging Right—No Tracking Dots Necessary

The Irishman Gets De-Aging Right—No Tracking Dots Necessary

At the time, he had been prepping a Frank Sinatra biopic, and he and Helman were talking shop about how to have one actor play a person at many phases of their life.

It's Now Easy to Shift Facebook Pics to Google (in Europe Anyway)

It's Now Easy to Shift Facebook Pics to Google (in Europe Anyway)

The data-moving tool has been created as a result of the Data Transfer Project (DTP), which was set up in 2018 and is a collaboration between the world's biggest tech companies: Apple, Facebook, Google, Microsoft , and are the group's key members.

The 25 Most Dangerous Vulnerabilities, According to DHS

The 25 Most Dangerous Vulnerabilities, According to DHS

Security researcher Oliver Hough found a database with information related to 51,000 customer service interactions, which included some personally identifiable information and full online chats.

Scientist pieces together details of underwater landslides

Scientist pieces together details of underwater landslides

New information about landslides that occur on the seafloor off New Zealand’s east coast will help scientists better understand why and where they happen, and the types of threats they pose.

The Real ID Is Nearly Here, and You Can’t Fly Home Without It

The Real ID Is Nearly Here, and You Can’t Fly Home Without It

The American Civil Liberties Union and the Electronic Frontier Foundation decried the Real ID as a subversive way to create a national ID, because the original plan called for creating a database of licenses across the 50 states.

How to Opt Out of the Sites That Sell Your Personal Data

How to Opt Out of the Sites That Sell Your Personal Data

Your personal data is valuable to marketers, which is why so many companies have details about you on their books—all of which can be used to target you with advertising, or to find out where you live and work, or even to steal your identity for fraudulent purposes.

New Emoji Are So Boring—but They Don't Have to Be

New Emoji Are So Boring—but They Don't Have to Be

After it encoded the original set of emoji from Japanese cellphone carriers, Unicode started looking to search results: If you submit a proposal for a new emoji, you need to provide screenshots showing how many webpages are found when you search for its associated word or phrase in Google Search, Bing Search, and Google Video Search, plus Google Trends.

Inside Olympic Destroyer, the Most Deceptive Hack in History

Inside Olympic Destroyer, the Most Deceptive Hack in History

The data centers in Seoul, however, weren't reporting any such problems, and Oh's team believed the issues with the contractor were manageable.The Olympics' official app, including its digital ticketing function, was broken too; when it reached out for data from backend servers, they suddenly had none to offer.

America’s ‘Green Economy’ Is Now Worth $1.4 Trillion

America’s ‘Green Economy’ Is Now Worth $1.4 Trillion

That’s why Maslin and lead author Lucien Georgeson accumulated their own data on the U.S. green economy, drawing on hundreds of often private databases containing granular, real-world business and transaction statistics.

How a 'NULL' License Plate Landed One Hacker in Ticket Hell

How a 'NULL' License Plate Landed One Hacker in Ticket Hell

Tartaro next turned to the DMV, which he says worked with the Citation Processing Center to void out the bulk of tickets that had errantly come his way.

When Open Source Software Comes With a Few Catches

When Open Source Software Comes With a Few Catches

Taking a slightly different tack, MongoDB relicensed its flagship database product last year under a new "Server Side Public License" (SSPL) that requires companies that sell the database system as a cloud service also release the source code of any additional software they include.

Alphabet's Plan for Toronto Depends on Huge Amounts of Data

Alphabet's Plan for Toronto Depends on Huge Amounts of Data

On Monday, Alphabet’s Sidewalk Labs released more detailed plans for Toronto, the site of the Google sister company’s first attempt to bring its techified, digital-forward sensibility to a full-scale development project.

A Plan to Stop Breaches With Dead Simple Database Encryption

A Plan to Stop Breaches With Dead Simple Database Encryption

That means MongoDB itself and cloud providers won't be able to access customer data, and a database's administrators or remote managers don't need to have access to everything either.

Cryptocurrency Company Hacks Itself Before Hackers Can Hack It

Cryptocurrency Company Hacks Itself Before Hackers Can Hack It

Security News This Week: Cryptocurrency Company Hacks Itself Before Hackers Can Hack It. Alyssa Walker. But Microsoft took the rare step this week of reversing course on some of its initiatives, deleting a database of 10 million images built from publicly available shots of 100,000 notable people.

Why Uber Is Fighting Cities Over Data About Scooter Trips

Why Uber Is Fighting Cities Over Data About Scooter Trips

To operate in Los Angeles, a city whose placid weather and flat-ish streets make an appealing market for scooter and bike companies, the firms had to agree to share data with LA’s Department of Transportation through MDS.

Platforms Want Centralized Censorship. That Should Scare You

Platforms Want Centralized Censorship. That Should Scare You

Responding to many questions about the speed of their reaction and the continued availability of the shooting video, several companies published posts or gave interviews that revealed new information about their content moderation efforts and capacity to respond to such a high-profile incident. The post-Christchurch push for centralizing censorship goes well beyond the GIFCT hash database.