Chris

21 Flips | 2 Magazines | 6 Likes | 4 Following | 2 Followers | @n5zap | Keep up with Chris on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Chris”

‘We love Google, but we fear Google’ – the full story of Google’s $6B EU nightmare

“We love Google, but we fear Google,” Vodafone CEO Vittorio Colao said during a high-profile debate that Eric Schmidt lost badly to one of the most …

Mobile Devices

NASA Declares End to Deep Impact Comet Mission

Communication cutoff leads to loss of comet hunter, say space officials.<p><b>NASA officials declared the Deep Impact mission lost on Friday, after a computer glitch doomed the comet-smashing spacecraft.</b><p>Launched in 2005, the spacecraft memorably smashed a copper-jacketed probe into the comet Tempel 1 at …

George Clooney's satellite spies reveal secrets of Sudan's bloody army

US news,George Clooney,Sudan,Massachusetts,Culture,Middle East and North Africa,Africa,World news,Politics and technology,Technology,Human rights,Law<p>Actor and activist funds a hi-tech project that is tracking troops and warning civilians of attacks<p>Nathaniel Raymond is the first to admit that he has …

11 Pictures Of Car Phones That Belong In A Museum

This exhibition made possible by hilarious outdated technology.

Rahm Emanuel

7 command-line tools for data science

<i>Update (05-02-2017) My new company Data Science Workshops provides in-company training and coaching on this exciting topic.</i><p><i>Update (7-17-2014) You may</i> …

The beginners guide to breaking website security with nothing more than a Pineapple

You know how security people get all uppity about SSL this and SSL that? Stuff like posting creds over HTTPS isn’t enough, you have to load login …

'Hacker' is used by mainstream media, September 5, 1983

On this day in tech history, the term “hacker” was first used by mainstream media when 17-year-old 414s member Neal Patrick appeared on the cover of …

Mainstream Media

1st actual computer bug found, September 9, 1947

On this day in tech history, the first case of an actual bug being the cause of a computer error was recorded in the log book for the Mark II.

Harvard

Steve Jobs leaves Apple Computer, September 16, 1985

On this day in tech history, Steve Jobs resigned as chairman of Apple Computer, only to return exactly 12 years later.

Construction begins on ENIAC, May 31, 1943

On this day in tech history, heavily veiled construction began on ENIAC, then code named “Project PX,” at the University of Pennsylvania’s Moore …

University of Pennsylvania

Programming pioneer Betty Holberton is born, March 7, 1917

On this day in tech history, Betty Holberton, one of the six original programmers of ENIAC, who went on to have a hand in many aspects of early …

1st FORTRAN program runs, September 20, 1954

On this day in tech history, FORTRAN was born, somewhat out of laziness.

Google's Self-Driving Cars: A Quest for Acceptance

Robots can already outdrive humans. Now everyone needs to get out of their way.<p>Every morning, at about 8 a.m., Anthony Levandowski walks out of his house in Berkeley and folds his six-foot-six-inch frame into the driver's seat of his white Lexus. Levandowski is embarking on his daily commute to …

Meeting the bandwidth demands of taking your business into the cloud

Deciding if the cloud is right for an organization is a tricky, mathematical dance.<p>Moving infrastructure from premises to the cloud can make sense …

Meet Hidden Lynx: The most elite hacker crew you’ve never heard of

These hired hackers have unusual skills and penetrate high-value targets worldwide.<p>A hacking team with unusual skill and persistence has penetrated …

Cloud provider gives customers two weeks’ notice before data vaporizes

Nirvanix will switch off on September 30; UK partner looks for rescue plan.<p>San Diego-based cloud storage provider Nirvanix has given its customers …

NSA aims to plug holes that sprang Snowden leaks

NSA official: "Could someone today do what [Snowden] did? No."<p>Trying to prevent the kind of leaks carried out by former contractor Edward Snowden, …

Air Force Research Lab puts money up for tools to stop future Snowdens

AFRL modifies cyber research program to find ways to catch "insider threat."<p>Whistleblowers have demonstrated how vulnerable military and intelligence …

Snowden docs now show Britain, not NSA, targeted Belgian telco

"Operation Socialist" designed "to enable better exploitation of Belgacom."<p>Citing documents provided by National Security Agency leaker Edward …

Senator asks if FBI can get iPhone 5S fingerprint data via Patriot Act

"You can't change your fingerprints. You have only ten of them."<p>Since Sen. Al Franken (D-MN) arrived in the United States Senate, he’s become the …

We don’t enable backdoors in our crypto products, RSA tells customers

Statement comes after firm said its products used RNG reported to contain NSA backdoor.<p>RSA, the security firm that confirmed two of its products by …