Twitter has disclosed the number of its users that are actually human as opposed to account-holding, automated programs in its most recent quarterly filing to the Securities and Exchange Commission. According to the report, about 23 million — or 8.5% of Twitter’s monthly active users — hold accounts that are programmatically updated “without any discernible additional user-initiated action.” Continue reading
How is a computer program able to spot Ebola happening before researchers can? HealthMap is a website that’s been around since 2006 and aims to help public health organizations determine that a crisis is occurring. Continue reading
Using the same kind of silicon used to make traditional computer chips, the “neurosynaptic processor” is designed to distribute various computing functions associated with memory storage and communicating across more than 4,000 individual cores. When linked together, the chips can create a mesh network that runs on an incredibly low amount of electricity. The team has dubbed the new system “TrueNorth.” Continue reading
After analyzing thousands of webcam snapshots of landscapes in various weather conditions, computer scientists at Brown University have developed a system that can automatically change the appearance of weather in nearly any outdoor photo. Continue reading
What happens when a drone crashes into one of the world’s largest hot springs? The aircraft might potentially damage the spring, but trying to remove it might cause even more damage.
The New York Times and a Midwest security firm are reporting a massive breach of online privacy that includes the collection of more than a billion username and password combinations and more than 500 million email addresses. Gwen Ifill talks to Dmitri Alperovitch of CrowdStrike about the method and urgency of the hack and who might be behind it. Continue reading
USB devices, commonly used to copy, store and share data, have also been known as a prime place to carry malware, or malicious software, from one computer to another. But that’s not the end of the story: researchers argue that USB security breaches don’t just originate from bad software, but from the fundamental core of how memory sticks function .
The American GDP grew at a 4 percent annual rate in the second quarter of the year, surpassing most predictions. But will the upward swing continue? Jeffrey Brown gets a snapshot of economic recovery around the country from Shirley Leung of The Boston Globe, Mark Vitner of Wells Fargo and Tom Binnings of Summit Economics. Continue reading
The Human Rights Foundation will host a two-day event in August, bringing together experts from the tech industry with North Korean activists and defectors. The goal — to brainstorm new ways of smuggling information into one of the world’s most walled-off countries. Continue reading