Imagine a house where the walls change colour depending on your mood, or your tablecloth changes shape when you’re having a dinner party. A house where every item, from your cushions to your lampshades, interact with you. This might sound like something out of Harry Potter, but such magic interior design could become a real part of our lives in the near future.
Author: The Conversation
When you are asked to create a password – either for a new online account or resetting login information for an existing account – you’re likely to choose a password you know you can remember. Many people use extremely basic passwords, or a more obscure one they reuse across many sites. Our research has found that others – even ones who use different passwords for each site – have a method of devising them, for instance basing them all on a familiar phrase and making site-specific tweaks.
Alita: Battle Angel is an interesting and wild ride, jam-packed full of concepts around cybernetics, dystopian futures and cyberpunk themes.
The film – in cinemas from today – revolves around Alita (Rosa Salazar), a female cyborg (with original human brain) that is recovered by cybernetic doctor Dyson Ido (Christoph Waltz) and brought into the world of the future (the film is set in 2563).
It has become possible to 3D print with quite a range of different materials, including the likes of wood and silver. Most machines are restricted to synthetics, however, such as plastics, rubbery polymers and nylons. Machines usually only print one material at a time, or swap between a palette of two or three materials
When the ten year challenge began doing the rounds on social media, people rushed to post profile pictures of themselves from 2009, side by side with one from 2019, to highlight how much they had changed (or not) in the meantime. It is estimated that more than 5.2m social media users participated in this challenge.
Every day, often multiple times a day, you are invited to click on links sent to you by brands, politicians, friends and strangers. You download apps on your devices. Maybe you use QR codes.
Most of these activities are secure because they come from sources that can be trusted. But sometimes criminals impersonate trustworthy sources to get you to click on a link (or download an app) that contains malware.
Ted Florence is ready for his family trip to Botswana. He has looked up his hotel on Google Maps and downloaded a digital map of the country to his phone. He has also packed a large paper map. “I travel all over the world,” says Florence, the president of the international board of the International Map Industry Association and Avenza Maps, a digital map software company. “Everywhere I go, my routine is the same: I get a paper map, and I keep it in my back pocket.”
It has the potential to ruin relationships, reputations and our online reality. “Deepfake” artificial intelligence technology promises to create doctored videos so realistic that they’re almost impossible to tell from the real thing. So far it has mostly been used to create altered pornographic clips featuring celebrity women’s faces but once the techniques are perfected, deepfake revenge porn purporting to show people cheating on their partners won’t be far behind. But more than becoming a nasty tool for stalkers and harassers, deepfakes threaten to undermine trust in political institutions and society as a whole. The White House recently justified temporarily banning a…
If social media was a person, you’d probably avoid them. Facebook, Twitter and Instagram are loaded with pictures of people going to exotic places, looking like they are about to be on the cover of Vogue, and otherwise living a fairy-tale existence. And, like all fairy tales, these narratives feel a lot like fiction. When you compare the “projected reality” to your lived experience, it would be easy to conclude that you do not measure up. Research shows that young adults are especially vulnerable to this phenomenon. We have also studied this trend in graduate students, our next generation of scholars: they too, implicitly…
About a quarter of internet users use a virtual private network, a software setup that creates a secure, encrypted data connection between their own computer and another one elsewhere on the internet. Many people use them to protect their privacy when using Wi-Fi hotspots, or to connect securely to workplace networks while traveling. Other users are concerned about surveillance from governments and internet providers. Many VPN companies promise to use strong encryption to secure data, and say they protect users’ privacy by not storing records of where people access the service or what they do while connected. If everything worked the way it was supposed to,…