Log in   •   Sign up   •   Subscribe  feed icon

Security

China's New J-20 Stealth Fighter Quietly Makes First Flight

When China's homegrown J-20 stealth fighter took to the air on its first test flight, it let the world know – albeit quietly – that China's air force won't take an ejection seat to anyone.

Social Media's Dark Side Casts Long Shadow Beyond Tucson Shopping Mall

Much has been written in an attempt to make some sense out of the shootings involving U.S. Congresswoman Gabrielle Giffords in Tucson, Arizona and the subsequent deaths of her aid, a judge and four others. Suspected shooter Jared Lee Loughner's social media footprints are being examined for clues as to his motives. But perhaps we are following the wrong trail of evidence. Political extremists who are effective in radicalizing certain segments of society are also using social networks to rally support for their causes.

Social Media Under The Gavel When WikiLeaks' Twitter DMs Were Demanded

Once again the popular microblogging site of Twitter is caught at the vortex of a political maelstrom where human rights are at issue. Differing from the Iranian election protests of 2009, this time the U.S. is appearing to be the heavy-handed oppressor. On December 14, the government's Department of Justice issued a court order to Twitter to the attention of its "Trust & Safety" department.

Acoustic Cloak Hides Objects In Plain Sound

Professor Nicholas Fang of the University of Illinois has created an acoustic cloak that hides objects from standard sonar waves - and it fits in the palm of his hand.

Spy Glasses Allow You To Read Invisible Messages

Want to look really good while reading a speech off of a blank sheet of paper?  These glasses will allow you to do just that...

Skype To Join China's Internet Graveyard Of Facebook, Flickr, YouTube & Google?

The Great Firewall of China is alive and well as companies like Google have been forced to relocate its operations to Hong Kong, and movers and shakers like Mark Zuckerberg while allowed to tour the country - is saddled with his social network being sequestered in "404 Not Found Territory" on China's Internet. But what about Skype - the Voice-over-Internet-Protocol (VoIP) provider? Surely, China's Big Brother doesn't want to censor phone calls, as well?

Crack Mask – Aqua Access Rather Than Addiction Affliction

Access to water during a fire or emergency is a must, but can often be difficult to find. Now, the Crack Mask offers mobile moisture during a panic. 

2010's Disruptive Technologies At Odds: Ipad vs WikiLeaks

The game-changing technology of the iPad and WikiLeaks fast became part of the world zeitgeist this year. Under normal circumstances disruptive technology is a stand-alone innovation setting a new path for technology that went before. If iPad disrupted the laptop and eReader industries, and WikiLeaks was a political game-changer in the world of journalism - how did they cross paths to motivate one to reject the other?

It's Been Leaked Social Media Acronyms Are Being Re-Defined

Our world was full of acronyms even before social media came onto the scene. In business, someone could be SOL because he was in deep water with his boss. Or a member of the military might be AWOL for taking too much time off for R&R and didn't CYA. But today, acronyms of all sorts have popped into our lexicon as the result of smartphones and Twitter -  where it became even more important to find quicker ways to communicate with a limited number of characters for a tweet or text message.

18-Function Chinese Army Shovel Is The Only Tool You'll Ever Need

The Swiss Army has the Swiss Army knife, Arthur Dent had his towel, and China has the latest in multifunctional do-it-all tools: the Chinese Military Shovel WJQ-308! Surrender now, resistance is futile... can you dig it?

Fingerprint Gun Aims To Load Up On Safety

Handguns are a danger in any industrialized country, and despite active gun registries and police presence, their use only seems to be increasing. Now, designer Sun Xiaotian has come up with a novel way of protecting the peace and the "piece" - the Fingerprint Gun.

Social Media Hackers, Heroes Or Villains?

Anyone who has seen the movie, The Social Network is familiar with how in the early years, Mark Zuckerberg pitted young students against each other in a heated competition as to who could "code" the fastest. The most savvy cognoscenti won a chance to join Facebook's start-up team back in 2004. On a recent installment of 60 Minutes, Lesley Stahl noted that "Hacker" posters papered the walls of FB's HDQ. Which begs the question - what determines whether hackers are heroes or villains?

File Sharing, The Ultimate Social Media Activity Rachets Up With Michael Jackson Release

From the days of Napster to Peter Sunde most recently facing millions in damages and an actual prison sentence for his illegal music and video sharing on The Pirate Bay, torrent files are prompting the government to intervene. And with the release of Michael Jackson's posthumous album "Michael" being leaked via file-sharing sites this week, Big Brother may enact more forceful censorship laws.

Philips Avent Baby Monitor With DECT Technology Keeps Your Nursery Private

Some baby monitors tend to pick up signals from outside the home.  As annoying as it can be to have these extra sounds coming through your monitor, it is also kind of creepy to think about the fact that someone else may be picking up sounds from yours.  The Philips Avent Basic Baby Monitor with DECT Technology keeps your nursery completely private with encrypted signals.

Probably Not TSA Approved - The Playmobil Security Checkpoint

With hilarity that seems almost too on-point to be real, the Playmobil "Security Check Point" has seen a sudden resurgence of interest online.

Ila Sport Pedometer Offers Extra Security During Your Late Night Workout

Work, family, social obligations and household upkeep take up a lot of time, which means that many people are forced to fit in their workouts at the end of the day.  For those who enjoy outdoor activities this means that exercise often takes place in the dark.  This is when having a device such as the Ila Sport Pedometer Alarm can really come in handy.

Social Media Leaks Categorize Julian Assange As The Osama Bin Laden Of The Internet

The founder of WikiLeaks is not only a wanted man by the American authorities, his now infamous Web site WikiLeaks is also under attack by notorious hackers, while its services are being cut-off by Amazon and EveryDNS.net. Although not officially announced, Julian Assange might be considered today's public enemy number-one, taking the place of the illusive Osama bin Laden. Not since 9/11 has any one figure reached such notoriety due to what many consider acts against a state.

12 Hot Gifts For Boomers, Seniors, & Maybe YOU This Christmas

Goodies and gadgets for the later-aged this Christmas... We have twelve, one for each day of Christmas and you can take your pick of your favorite 8 for Hanukkah gifts.  You'll have to judge which are the best for your boomer and senior relatives; we don't all age gracefully.

 


Social Media Random Chat Minus The Private Parts

When Howard Stern titled his 1997 movie, "Private Parts," it was of course a double entendre that exposed the bad boy radio jock's origins while also referencing his obsession with the physical anatomy. When the video chat site Chatroulette graced (or disgraced, dependent on your point of view) our computer screens, that social network gave a whole new meaning to the psychological term "penis envy." With the recent launch of HowRandom.com, a new social media site looks to eliminate visuals from the chatting equation.

Will The Social Media Bubble Follow The Financial Crisis?

Are Internet bubbles on a 10-year cycle? Like the economic booms and busts that have occurred over the course of last 30 years, similar Internet peaks and valleys seem to follow suit according to John Doerr of Kleiner Perkins Caulfield & Byers. He refers to them as "waves" and it appears that we are currently transitioning from a simmer to a slow boil presently.