The 300-pound humanoid robot that NASA wants to use for space exploration has arrived at MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) this week. Researchers at CSAIL, led by CSAIL principal investigator Russ Tedrake will program their new “Valkyrie” robot to autonomously perform challenging tasks that would allow it to replace or help astronauts … continue reading
The real-time operating system that powers the Arduino 101 and Genuino 101 is open source, ready for those who want to use it for studying purposes. This package contains the complete BSP (Board Support Package) for the Curie processor on the 101. It allows developers to compile and modify the core OS and the firmware … continue reading
Recent reports show Google and other technology companies are standing with Apple in the FBI/Apple conflict, while others like Bill Gates sided with the FBI. Meanwhile, Apple’s engineers have begun developing new security measures that would make it impossible for the government to break into a locked iPhone, even if they do win the fight. … continue reading
It’s that time of year again: Black Hat and Defcon are upon us! That means your systems are all in danger, and your applications should be afraid. Not only will there be (and has already been) an endless stream of new exploits dropped at the shows, but the weekend of Defcon is, effectively, open season … continue reading
By now you’ve probably heard of Ross Ulbricht and Silk Road. When he was apprehended last year in San Francisco and charged with running the world’s largest online drug and illegal goods marketplace, he was at a local library using the wireless network to log in to his black market business. Ulbricht is still claiming … continue reading
For development teams, cloud computing is enthralling. Where’s the best place for distributed developers, telecommuters and contractors to reach the code repository? In the cloud. Where do you want the high-performance build servers? At a cloud host, where you can commandeer CPU resources as needed. Storing artifacts? Use cheap cloud storage. Hosting test harness? The … continue reading
Carnegie Mellon computer scientists create GOTCHA, a password defense mechanism similar to CAPTCHAs … continue reading
Can one word justify seizing a developer’s property? A huge legal fight will ensue over it … continue reading
Hackers are one step ahead of security efforts, and are better organized than the businesses they target … continue reading